Data and Analytics Initiative Navigation
Data and Analytics Initiative
Policies
Adherence to data-related policies steward the College’s data assets and support the delivery of trusted information to decision-makers
Linked File | Brief Description | Category |
---|---|---|
Confidentiality Policy | Outlines obligations related to handling confidential data for any member of the extended community with such access. | Policy |
Data Access and Usage Policy | Haverford College is committed to maintaining the integrity and security of records and information created, received, maintained, and stored by the College while carrying out its educational mission. This policy establishes a consistent framework for access to and usage of College data. | Policy |
Data Classification Policy | The Haverford College Data Classification Policy provides common terminology to consistently guide access to and security around College data assets. This policy defines three categories of data (Confidential, Internal, and Public). It assigns each category an associated risk level (High, Moderate, or No Risk), as well as an access level. | Policy |
Data Governance and Management: Principles and Practice | This foundational document explains the College’s approach to Data governance and stewardship across the institution. It also includes a helpful list of laws, regulations, and best practices along with references to other specific policies for additional details and context. | Document |
Data Request Form | This form should be used to request data from a Haverford College system of record or the integrated data repository in support of College initiatives and operations. It is appropriate to use this form to request data:
|
Form |
Data Storage and Transmission Guidelines | This document provides detail on how data within each of the risk/data classification categories should be stored and transmitted to appropriate end users. The document also includes a shared storage recommendations section providing guidelines on choosing to save material relevant to college business under Box or Google Drive. | Guideline |
Guidelines for File Naming Conventions | A comprehensive document outlining best practices for naming files (and folders) in a consistent, organized manner. It offers clear directives on structuring file names to enhance accessibility, version control, and searchability, thereby improving efficiency and collaboration within the College. | Guideline |
IITS Cybersecurity Policy | The overall goal of this policy is to ensure these resources are maintained according to the core principles of cybersecurity: confidentiality, integrity, and availability. | Policy |
Policy on Acceptable Use of Information Technology | This policy addresses acceptable and unacceptable usage of College Information Technology (“IT”) Resources. | Policy |
Policy on Proxy Use in Workday | Outlines proxy access for employees who have been identified as needing access to Proxy capabilities in the test environments of the College’s core Enterprise Resource Planning system, Workday. | Policy |
Records Management Policy | Comprehensive policy that goes over the records management at HC. | Policy |
Records Management Procedures/Guidelines | Training and specific guidance to assist Departments with effective records management. | Guideline |
Records Retention Schedule | Outline of records retention schedule that should be used in tandem with the Records Management Policy. | Document |