Rule Administrator: Chief Information Security Officer
PART 1: PURPOSE This Rule specifies the requirements for accessing computer data logs. PART 2: RULE Access to computer data logs is restricted. Access to these logs shall be granted with written approval of Chancellor/Chancellor, provost, general counsel, human resources, internal audit department or law enforcement.
PART 1: INTRODUCTION The Fair and Accurate Credit Transactions Act of 2003, an amendment to the Fair Credit Reporting Act, requires rules regarding identity theft protection to be promulgated and adopted jointly by the Office of the Comptroller of the Currency, Treasury; the Board of Governors of the Federal Reserve System; the Federal Deposit Insurance…
Continue reading “15.91 – Identity Theft Protection” »