Close menu William & Mary

Glossary

Become familiar with terms seen frequently in IT's Policies & Standards pages.

  1. Contingency Planning:  a proactive process to prepare for and recover from disruptions to IT services.
  2. Continuity of Operations and Disaster Recovery Plan (IT COOP/DR):  the documented processes involved in supporting continued operations during a disruptive event and restoring critical IT systems and data afterward.
  3.  
  4. Critical system: a system deemed critical to support the university’s mission critical operations.  These are systems identified as highest priority for restoration during a disaster scenario. 
  5. IT Project:  A project with a primary purpose to create or enhance a unique information technology product or service.  Research projects, research initiatives and instructional programs are not included in the scope of this policy.
  6. IT Risk:  the potential for adverse impacts on IT services and data due to vulnerabilities, threats, or system failures.
  7. Mission Essential Function (MEF):  a university function vital to the university's continued operation, ven during an emergency or disaster scenario.
  8. Non-person (system/service) account: an account assigned to a system or service that accesses, transmits or edits data, system configurations or computer programs. 
  9.  Non-Sensitive data: information that may or must be open to the general public. It is defined as information with no existing local, national or international legal restrictions on access or usage. By way of illustration only, some examples of Non-Sensitive data include:  
    1. Publicly posted press releases  
    2. Publicly posted schedules of classes.  
    3. Publicly posted interactive university maps, newsletters, newspapers, and magazines.  
    4. Public announcements, advertisements, directory information, and other freely available data on university websites.
  10. PMI:  Project Management Institute
  11. Privileged user account: an account assigned to an individual with responsibilities for administering information technology services or systems.  These accounts generally have elevated permissions to perform tasks that, if unauthorized, could potentially compromise the security of systems and data or disrupt operations. 
  12. Project:  A temporary endeavor undertaken to create a unique product, service or result (PMBOK, 2021 edition).
  13. Project Management:  The application of knowledge, skills, tools, and techniques to mitigate risk, control budget and manage scope of tasks.
  14. Protected Data: information that is protected by statutes, regulations, university policies or contractual language but which does not carry the same level of risk as Sensitive and Personally Identifiable Information. By way of illustration only, some examples of Protected Data include:  
    1. Student educational records protected by the Family Educational Rights and Privacy Act (FERPA). Under FERPA, education records are any documents, files, and/or other materials that contain information directly related to a student, are personally identifiable to that student, and are maintained by the university or a university agent. These records include but are not limited to grades, transcripts, class lists, student course schedules, contact and family information, student health records, student financial information (at the postsecondary level), and student discipline files.The information may be recorded in any way, including, but not limited to, handwriting, print, computer media, videotape, audiotape, film, microfilm, microfiche, and e-mail.  
      1. FERPA designates several types of records that are exceptions to this definition, including law enforcement records and medical and treatment records. For more detailed information contact the University Registrar at[email protected]or visit the webpageStudent Records Privacy Policy and Notification of Rights under FERPA 
    2. Personal information or giving history collected from a donor, alumnus, or another individual  
    3. Employment or non-identifiable personnel data  
    4. Banner 93 numbers 
    5. Performance evaluations  
  15. Recovery Point Objective:  a maximum amount of data loss that is acceptable.
  16. Recovery Time Objective:  maximum amount of time it should take to restore normal operations after a failure.
  17. Sensitive system: a system that stores or processes data classified as protected or sensitive in the university’s Data Classification and Protection policy.  
  18. Sensitive Data: iinformation considered highly confidential or personal information protected by statutes, regulations, university policies or contractual language which, if exposed or breached, could result in legal damages, fines/penalties, identify theft and/or financial fraud.   
    1. Sensitive and personally identifiable information includes any data that can be used to distinguish or trace an individual's identity, either alone or when combined with other information. Examples include a name, home address, email address, social security number, driver's license number, bank account number, passport number, date of birth, biometrics such as fingerprints, or information that is linked or linkable to an individual such as medical, educational, financial, and employment information.  
    2. Information such as gender, race, religion, and marital status are typically not considered PII alone. However, this information should still be treated as sensitive because it could identify an individual when combined with other data.  
    3. Specific examples of sensitive and personally identifiable information include:  
      1. Social security numbers  
      2. Driver's license numbers  
      3. Credit/debit card numbers  
      4. Passport numbers  
      5. Taxpayer identification numbers  
      6. Federal ID numbers  
      7. Student financial aid data  
      8. Employee health records  
      9. Financial data that informs the university’s end-of-year financial statements  
      10. System account credentials  
    4. Sensitive data does not include information in the William & Mary directory or data that is made public by the university. Furthermore, the university has no obligation to protect an individual’s personal information if the personal information is provided to a third-party by another supplier without the involvement of the university.  
  19. User account: an account assigned to a currently active staff member, student, or university affiliate for the purpose of accessing information technology services and systems

Questions? 

Contact the Technology Support Center (TSC)
757-221-4357 (HELP) | [email protected] | Monday - Friday, 8:00 am - 5:00 pm

 

OSZAR »