Control Category: Governance
-
Incident Reporting
Read more: Incident ReportingPromptly report actual or suspected compromise, including loss, theft, improper use, modification of, or access to information to security@mit.edu.
-
Self Assessment
Read more: Self AssessmentReview your systems and procedures regularly to ensure the tasks for this risk level are applied.
-
Security by design
Read more: Security by designIf you are developing (or contracting a vendor to develop) applications processing this level of information, include security as a design requirement.
-
Code review
Read more: Code reviewIf you are developing (or contracting a vendor to develop) applications processing this level of information, review code and correct flaws prior to deployment.
-
Annual Review
Read more: Annual ReviewContact security@mit.edu for an annual review to verify that all security tasks are working properly.
-
Sponsored research
Read more: Sponsored researchIf you have received data as part of a sponsored research project, and your contract includes clauses on data security there may be additional tasks. Please contact infoprotect@mit.edu.
-
Payment processing
Read more: Payment processingIf you are accepting credit card payments, you may need to complete additional tasks. Please contact infoprotect@mit.edu
-
HIPAA or PHI
Read more: HIPAA or PHIIf you handle Protected Health Information (PHI) or Individually Identifiable Health Information, there may be additional tasks to complete. Please contact infoprotect@mit.edu.