Research Computing & Compliance
The Research & Security Services team is responsible for implementing the programs and policies necessary to align the College's personnel, resources, and assets according to the University Institutional Data Policy, Information Security Standard (ISS) and Information Security Control Requirements (ISCR).
Faculty, staff and students who are aware of a breach of data security policies are required to immediately report the breach to ENGfirstname.lastname@example.org. If no response is received within 4 hours of reporting, please contact University Enterprise security at email@example.com.
Report a Data Breach
ETS provides automated methods for delivery of software updates and patching to all College of Engineering managed systems. All third party applications that process or store institutional data that is hosted in an off-premise location, managed by a third party, must undergo a risk assessment.
Review Software Update Documentation
Review Cloud Hosted Application Policy
Request Cloud Hosted Application Security Assessment
OSU owned and managed servers, endpoint, and mobile devices are deployed with device encryption consistent with College and University security guidelines.
ETS has implemented DLP in order to classify, identify and manage restricted data. The goal of DLP is to mitigate risks associated with storage of and access to Institutional Data.