Computing and Communications Security Records

Information Details

Location

Manager, Information Technology Security

Information Maintained

Criminal activity or records, disciplinary proceedings, correspondence.

Uses

Track abuses of the computing systems and/or prosecution of the individuals, to ensure that inappropriate activity does not lead to compromises of this critical resource.

Users

IT Security Manager

Individuals in Bank

Students, employees.

Category

Information Systems and Records Management

Legal

Legal Authority

University of Guelph Act (sections 11 & 13), 1964.

Retention and Disposal

7 years then confidential destruction.