Once you have secured all computers that access NYU resources, you must now begin the process of securing the data that resides on those computers. Before you begin the process of identifying and securing the data, review the Electronic Data and System Risk Classification Policy to understand the different categories of sensitive data and what is contained in each.

Assess - Review - Secure diagram

The Three Steps: Assess, Review, Secure

Step 1: Assessing Business Processes

Step 2: Review Data Storage and Collection

Step 3: Secure Sensitive Data

Enabling Automatic Updates