133 SPEC Kit 360: Learning Analytics UNIVERSITY OF MASSACHUSETTS AMHERST Information Security Policy - Draft http://www.umass.edu/it/policies/drafts the researcher, preliminary notes or manuscripts, reviews, or related communications, or items that are already the property of others. This definition is intended to characterize current research norms, not to modify them. Service Security Plan: Formal document that provides an overview of the security requirements for an information system and describes the security controls in place or planned for meeting those requirements. User: A person who accesses, manages, or manipulates institutional information, research data, or information technology resources. This definition includes, but is not limited to, all faculty, students, staff, contractors, visiting researchers, or guests and volunteers. VII. References Confidentiality of Institutional Information Technology Resources Policy http://www.umass.edu/it/security/conf-policy [11] 1. Acceptable Use of Information Technology Resources Policy http://www.umass.edu/it/security/acceptable-use-policy [12] 2. Records Retention and Disposition Schedules http://www.umass.edu/records/record-retention-and-disposition-schedules [13] 3. Secure Disposal of Information Technology 4. UMass Amherst IT Security Center http://www.umass.edu/it/security [14] 5. Source URL: http://www.umass.edu/it/policies/drafts Links: [1] http://www.umass.edu/it/policies/drafts [2] http://www.umass.edu/it/security/incident-reporting [3] http://www.umass.edu/it/security/data-categorization [4] http://www.umass.edu/it/security/controls [5] http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf [6] http://www.umass.edu/it/security/roles [7] http://www.umass.edu/it/security/information-management [8] http://www.umass.edu/it/security/informationsecurityliaisons [9] http://www.umass.edu/it/support/security/informationtechnologyarchitecture [10] http://www.umass.edu/it/security/access [11] http://www.umass.edu/it/security/conf-policy [12] http://www.umass.edu/it/security/acceptable-use-policy [13] http://www.umass.edu/records/record-retention-and-disposition-schedules [14] http://www.umass.edu/it/security