Computing and Communications Security Records
Information Details
Location
Manager, Information Technology Security
Information Maintained
Criminal activity or records, disciplinary proceedings, correspondence.
Uses
Track abuses of the computing systems and/or prosecution of the individuals, to ensure that inappropriate activity does not lead to compromises of this critical resource.
Users
IT Security Manager
Individuals in Bank
Students, employees.
Category
Information Systems and Records Management
Legal
Legal Authority
University of Guelph Act (sections 11 & 13), 1964.
Retention and Disposal
7 years then confidential destruction.