Information Technology Services

Restricted Data

Examples of Restricted Data
The following restricted data has been determined by the Data Custodians (institutional owners of the data) or because it is covered under Federal Law, State Law, or by University Policy.  Please note that this list is not all inclusive, and if you are unsure whether data is restricted or not, contact the University Help Desk at 239-590-1188 for further clarification.

Institutional or Personal Finance Data such as: Credit card numbers, p-card numbers, accounts receivable transaction records, donor gift history including dates and amounts, institutional checking or investment numbers
Employee Data such as: Benefits information, birth date, banking information, health insurance policy, ID numbers, transcripts, education records, photos (for public distribution)
Personally Identifiable Data such as: Passport and visa numbers, social security numbers, driver's license numbers, social insurance numbers (Canada)
State or Federally Protected Data such as: Law enforcement records, health or medical information, including Protected Health Information (PHI), information exempt in Florida Statue 119, export controlled information under U.S. laws, HIPAA protected data, FERPA protected data, Gramm-Leach-Bliley
University Data such as: Responses to bids/RFPs/ITNs until 30 days after award, privileged attorney-client communications, computer account passwords, EagleID ISO numbers
Student Data such as: Student banking information, transcripts, student payment history and bills, admission applications, education records, financial aid and scholarship information, registration information, judicial student affairs, grades with UINs and any grouping of information that connects a student name and UIN

What Is Restricted Data?
Restricted Data: Restricted data is data in any format: Collected, developed, maintained or managed by or on behalf of the University, or within the scope of the University activities that are subject to specific protections under federal or state law or regulations or under applicable contracts, and whose loss or unauthorized disclosure would impair the functions of the University, cause significant financial or reputational loss, or lead to potential legal liability, such as patrons social security numbers, or credit card numbers.

Please click here for the University Policy


Please note that this list is not all-inclusive; if you are not sure if data is considered restricted, please contact FGCU Help Desk at 239-590-1188.

 

How Do I Handle Restricted Data at Work?
It is okay for you to work with this data, but you have to be mindful of where you store it.

Electronic Copies:

  • Your departmental "private" file share folder (P:\),
  • Your cross departmental file share folder (R:\), or
  • Your home file share folder (W:\)
  • Do NOT store in cloud storage such as OneDrive, SharePoint, MS Teams, Dropbox, etc.
  • If stored on your local computer or laptop, the data must be encrypted (refer to ITS KB > Encrypting files using 7-Zip)
  • Remove it when you no longer need it

Physical/Hard copies:

  • Should be printed locally and retrieved immediately to avoid pickup by someone else
  • Must be retrieved immediately from network printer (if no local printer available)
  • Do not fax hard copies of restricted data
  • Store in a secure location, such as a locked file cabinet
  • Dispose via a cross-cut paper shredder

Important Note: Even when notetaking, if ANY information mentioned above has been captured, do NOT leave out in the open and destroy when no longer needed

 

Example 1: Electronic Grade Book:
Tracy Smith downloads a copy of the grade book from Canvas. The grade book in Canvas includes the following columns: UIN, student name, grade. Due to fact that the downloaded file contains all three identifiers about a student, this is restricted information. Ms. Smith should encrypt the file, including the grade information, if she stores it on her computer (refer to ITS KB > Encrypting files using 7-Zip).

 

Example 2: Paper Grade Book:
Tracy Smith has a binder in her office that includes the grades of her students from past years. The students are all identified by UIN and name, and beside their names are their grades. Ms. Smith can keep this grade book as long as she stores it in a locked location, such as a locked filing cabinet or locked bin (refer to ITS KB > Encrypting files using 7-Zip).

 

How do I Handle Restricted Data at Home?

  • Remote access to the data must be via FGCU's VPN services, unless you use systems such as Gulfline or Canvas. These systems use a secured connection (SSL) and require authentication. For more information, access ITS > Connecting Remotely and ITS KB > Remote Access Guidelines
  • You should NOT download restricted data to your remote computing device
  • If downloaded, data must be encrypted (refer to ITS KB > Encrypting files using 7-Zip)
  • Remove the data when you no longer need it

What is Encryption and Why Use It?
Encryption is the method of using a user supplied key, such as a password, to encode a file into an obfuscated format. This makes the file unusable until it is decrypted back into its original format. To do so, you must use the key and the program that were used to encrypt the file. Since the file will be unusable without the encryption key, it is imperative that you use a key you can remember.

 

Can I send Restricted Data to Others?

  • Must not be sent via email
  • May be shared with other people at FGCU file share:
    • Departmental "private" file share folder (P:\)
    • Cross departmental file share folder (R:\)
  • If you must send the data to someone outside the university, it must be encrypted and sent via secure method (refer to ITS KB > Encrypting files using 7-Zip). If data is shared with an external entity, it must be accounted for in the annual restricted data inventory.

I’m Using Restricted Data on my home PC, what Should I Do?

  • Determine if you MUST save the restricted data
  • If you must store restricted data on your PC, then your PC MUST be encrypted

 

How Do I Dispose of Equipment that has stored Restricted Data?

  • Devices such as desktop computers, laptops, printers, tablets must be disposed of by ITS to prevent restricted data from leaving the university because they follow an FGCU approved process to ensure data security
  • Other storage devices, such as CDs, flash drives, tapes must be disposed of via the office of Records Management

Where Can I Store Restricted Data?
If you need to store restricted data in electronic format, FGCU recommends you do so in your departmental share folder, or cross group folder; otherwise, encrypt (refer to ITS KB > Encrypting files using 7-Zip). 

** Do NOT store restricted data on OneDrive, SharePoint, MS Teams, Dropbox, etc.

 

What about Cloud Storage, or Flash Drives?
Other storage locations, such as cloud storage or removable drives should not be used for restricted data. If this location is the only available location, restricted data stored there MUST be encrypted.

 

I May Have Lost Some Data.  What Do I Do?
In the case of lost restricted data, please contact the University Help Desk immediately at 239-590-1188.

 

How Long Can I Store Restricted Data?
Remove restricted data from any system that is not the permanent resting place of the data as soon as possible. Please consult the office of Records Management with any questions you may have regarding storage, document management, security, retention and destruction.