Information Security

Information Security at GW refers to the processes and methodologies that are designed and implemented to protect print, electronic and all forms of regulated and restricted GW information from unauthorized access, use, misuse, disclosure, destruction, modification or disruption.

We work closely with the GW community to reduce the risks to our information by:

  • Conducting risk assessments
  • Classifying GW information and identifying proper safeguards
  • Connecting resources to protect GW information at risk
  • Developing and updating university policies that protect our information

Types of Information that Need Protection

The following are examples of regulated information that need protection, as noted, in our information security policy:

  • Government-issued identification numbers, including social security numbers, driver’s license numbers and passport numbers
  • Financial account numbers, including credit card numbers and bank account numbers
  • Personal data/information relating to an identified or identifiable person physically located in the EU
  • Personal health or medical information

Help Protect Our Information

Protect information at GW by following sound data storage and custodial practices.  

  1. Restrict physical access to your computers and mobile devices (e.g. lock your office door, use security cables or locking devices)
  2. Restrict access to information by using strong passwords, not sharing your passwords (passcodes) and logging out of systems when finished
  3. Understand the requirements involved with having custody of certain types of data and limit information sharing to those that have a legitimate need to know
  4. Restrict dissemination of information from the system of record (e.g. downloading to media, uploading to 3rd party storage services, social media, emailing, and printing)
  5. Notify your manager or appropriate university official and the IT Support Center immediately if you suspect information, passwords or other system access mechanisms are lost, stolen or disclosed or suspected of being lost, stolen or disclosed.

Handy resource guides are below and more information can be found on the IT Security site. 

Complete the Survey

This survey will be used to collect regulated information from university stakeholders. Contact us if you have questions.