We have the resources you need to keep your computing experience at Pitt safe and secure.
Be sure to visit the Secure Your Data page to learn about tools for faculty and staff to help protect University computing resources and sensitive information.
Planning to travel abroad? There's a lot to know! Refer to these guidelines to help secure your devices and data while traveling internationally.
What is Sensitive Information?
Any information that can be used to identify you or another person is sensitive information. Be Advised: Sensitive information is regulated by laws and University policies and should never be stored on your computer's hard drive, on a portable device, or sent via email without proper authorization.
Examples of sensitive information include the following:
- Personal Information - Social Security Numbers, driver's license numbers, and similar personal identifiers.
- Financial Information - bank account numbers, credit card numbers, and similar information.
- University Administrative Computer Data - employee personnel records, student educational records, University financial information, and electronic documents such as email messages, reports, memoranda, letters, and other electronic document files that contain confidential information.
- Passwords - to University systems or personal accounts on non-University systems.
- Research Data - Any data that is used to validate research findings. Human subject data (Social Security Numbers, for example, in medical records) and laboratory animal care information are federally-regulated and especially sensitive.
By following the steps in the Secure Your Data community at My Pitt (my.pitt.edu), University units will have the necessary security controls in place to protect both their computing resources and any sensitive information under their control.
For more information about University sensitive information, review technology-related University policies.
Access request forms for the student information system, data marts, and other services.
A Federated Authorization Process is used to control access to the University's student information system (PeopleSoft), the University's data marts, and the University's Data Warehouse. The Federated Authorization Process is designed to ensure that users of these systems have access only to the data they require in order to fulfill their University responsibilities.
To access the Federated Authorization forms, please visit our Service Requests page.