Guidelines

Guidelines are recommendations. It can be a useful piece of advice, such as "To create a strong password, take the first letter of every word in a sentence, and mix in some numbers and symbols. 'You Can't Have Everything. Where Would You Put It?' becomes 'Uch3Wwup1?'" You are able to create a strong password without following this advice, which is why guidelines are not mandatory.

Cloud Computing Guideline

  • For the use of social networking applications, file storage, and content hosting.

Data Security Rider

  • Data Security Terms for inclusion in Contracts with Service Providers.

Non-Disclosure Agreement

  • Ensures that an individual or organization appreciates their legal responsibility
    to maintain the confidentiality of sensitive information.

Waiver Certificate to Remove University of Cincinnati Owned Data from the University

  • For the removal of UC owned data from the university.


Cloud Computing

  • For the use of social networking applications, file storage, and content hosting.

Data Security Rider

  • Data Security Terms for inclusion in Contracts with Service Providers.
  • University of Cincinnati Information Security
  • 132/134 University Hall
  • 51 Goodman Drive
  • Cincinnati, OH 45221