Topics Map > Information Security > Tools and Software > Identity Finder

Reporting Restricted Data

This guide will explain how to complete the reporting survey for Restricted Data compliance.

  1. Complete the department and reporting individual identification form.
    • The "UDDS#" field expects input of the form "AXXXXXX", where "X" is a number.

  2. Complete the machine enumeration forms.

  3. Complete the forms indicating where data was and was not removed.
    • Because it is possible for individual machines that did not remove data to belong to more than one of the defined categories, your totals may be higher than the total number of machines that did not remove data. In the below example, it was determined that five machines are being used for business processes related to both 'Administration' and 'Teaching and Learning'. While only 50 machines did not remove data, our categories total to 55--this is perfectly fine and expected.
    • While removing data containing SSNs is not required by policy, reducing the number of machines storing SSNs is a long-term goal and this information will help us track that progress.

  4. Complete the section describing business needs for SSNs storage and the SSN audit method(s) used.

  5. Optionally request a followup email from IT Security.
  6. Finally, optionally explain the source of SSNs for machines which were found to store SSNs.

Keywords:"identity finder" identity finder idf report reporting restricted data ssn social security number   Doc ID:46313
Owner:Andy S.Group:Office of Campus Information Security
Created:2015-01-20 13:21 CSTUpdated:2015-10-16 13:34 CST
Sites:DoIT Help Desk, Office of Campus Information Security
Feedback:  0   0