Data Privacy and Protection

Protecting personal information is a shared responsibility at GW. The university recognizes the importance of safeguarding personal information, in all formats throughout the data lifecycle, that is processed or shared with the university and with third parties on its behalf.  As such, GW employs policies, notices and resources to promote compliance with requirements of privacy laws and regulations.

The Personal Information and Privacy Policy (PDF) promotes compliance with the requirements of privacy laws and regulations, including the Family Educational Rights and Privacy Act (FERPA), Gramm-Leach-Bliley Act (GLBA), and the General Data Protection Regulation (GDPR); and to advise university faculty, staff, and students of the community’s responsibilities with respect to privacy and protection of personal information.  


Proper data classification is key to protecting data.   The How to Categorize your Information (PDF) and the Guide to Information Management and Protection Policies (PDF) guides are tools to assist in your data classification determination.


The Information Security Policy (PDF) provides information on how to identify the information in custody of a specific office and how it must be secured.  It also highlights the roles and responsibilities of individuals, schools, divisions, and university administration in the custody and control of this information.  

Tools are available to help with appropriate data storage and custodial practices (PDF), email security (PDF)data encryption (PDF), and data security abroad (PDF).  More information can be found on the IT Security website.   


The Records Management Policy (PDF) is another key component of data privacy.  This policy explains GW's record retention requirements and includes the following:

The Record Management Policy Procedures (PDF) will help you with proper implementation of the policy.

If you are unsure about what data you are working with, or how to protect it, don't hesitate to ask!

PRIVACY TRAINING is available upon request.  If you have questions about how to protect information or if you require training, please contact [email protected]