ARCHIVED: About the IT-28 Participation Form

This content has been archived, and is no longer maintained by Indiana University. Information here may no longer be accurate, and links may no longer be available or reliable.

The University Information Security Office (UISO) recognizes that some units (those that are "fully supported") do not manage their own information technology resources. To reduce the administrative burden on these units while keeping them involved in the process surrounding Cyber Risk Mitigation Responsibilities (IT-28), the UISO has developed the IT-28 Participation Form as an alternative to the more thorough Comprehensive Evaluation form. The IT-28 Participation Form allows fully supported units to perform a self-assessment and recognize areas of possible improvement. A peer review team can then identify any areas of concern, if warranted.

To request an IT-28 Participation Form, send mail to it28help@iu.edu. Once your unit has filled out the IT-28 Participation Form, send the completed form to it28help@iu.edu.

For guidance about storing institutional data, consult the Data Sharing and Handling (DSH) tool.

This is document bdtw in the Knowledge Base.
Last modified on 2021-10-06 14:13:29.