Knowledge Base
  • 👋Welcome to our Knowledge Base!
  • ⁉️About TEDx
    • 💜Get Involved!
  • ✅Event Prep Checklist
  • 🧙Member Resources
    • 💜Files, Digital Resources
    • 👥Passwords
    • 💅Hosting a Salon
      • 🐣Salon Expectations
  • ⚡Team Resources
    • 🖼️Logos, Design
      • ❌TEDx Logos & Templates
      • 🎒IU Logos & Templates
      • 🎨Graphic Design & Video Editing
      • 📖Pamphlets
      • 📸Photos & Photographers
    • 🎟️Advertising
      • 📧Emailing Lists
      • 📅Event Calendars & News
      • 📺IU Digital Signage
      • 🚌Bus Ads
    • 🎭Stage & Installation Design
      • 🏠Staging
        • 🤔Ideate & Design Staging
        • 🏛️Making a Model
        • 🔨Where to Make Staging
      • 📽️Projection Mappping
      • 🤝Lobby & Social Spaces
      • 📄BCT Tech Form
    • 📽️Video, A/V
      • 📹Videography
      • 📈A/V and Slides
      • 🎙️Audio
    • 💻Digital
      • 🔗Web Development
        • UX Sketching
        • Getting Started with Wix Studio
        • Getting Started with CSS
        • TEDx Anagram (User Interface)
      • 🔓Data Compliance
      • ⁉️Troubleshooting GitBook's Entra ID Authentication
      • Downloading YouTube Videos
    • 💡Curation
      • ✔️Commitment Expectations
      • 🤝Onboarding
        • 🤔Understanding TEDx
        • ✍️Theme Interpretation
      • 📬The Outreach Process
        • Pitching Your Speaker
        • 🗯️Communication Resources
          • Invitation Email
          • Keeping-them-around
          • Declining Speaker After Call
          • Official Invitation Email
          • Post-Invitation
      • 📝The Pre-Conference Process
    • 📐Logistics
      • 🚪Room Reservations
      • 🏁Rentals & Checkout
    • 🤑Finance
      • 💸How to Reimburse in Chrome River
      • 📅General Schedule for Finance
      • 📈Funding Boards
      • 💜Local Partnerships
      • 👔Corporate Sponsors
      • 🧐Additional Funding Things
      • 🥰Karen!!! & Luddy
      • 💳Purchasing
      • 💱Reimbersements
      • 🎭BCT (Buskirk-Chumley Theatre)
      • 👋Team Considerations
      • 🤡Miscellaneous
  • 🎤Speaker Resources
Powered by GitBook
On this page
  • Overview
  • Jurisdiction
  • University Public Data
  • University Internal Data
  • University Restricted Data
  • University Critical Data
Export as PDF
  1. Team Resources
  2. Digital

Data Compliance

PreviousTEDx Anagram (User Interface)NextTroubleshooting GitBook's Entra ID Authentication

Last updated 10 months ago

Overview

Both from an ethical standpoint and a compliance/policy standpoint, we are obliged to ensure that we handle data in an appropriate manner. The way in which we handle data — including where it's stored, how it's stored, whom it's shared with, and how long it's retained — depends on the data type, as listed below. In the following sections, PII refers to Personally Identifiable Information, such as emails, names, addresses, etc.

Jurisdiction

TEDxIndianaUniversity must comply with Indiana University and Indiana University Bloomington data policy. Additionally, we may be required to comply with State and Federal data regulations. At this time, TEDxIndianaUniversity is not obliged to comply with GDPR (European Union General Data Protection Regulation), which applies to larger companies and organisations operating in the EU or the EEA. Additionally, we do not yet qualify as an organisation that must comply with other US State data regulation, such as CCPA (California Consumer Privacy Act). That being said, TEDxIndianaUniversity may use practices and/or tools traditionally used with GDPR or CCPA to comply with University policy, where required.

When in doubt, always consult the to determine what kind of data you're processing or storing. Some data levels will require that you take preventative measures and .

University Public Data

University Internal Data

University Restricted Data

University Critical Data

Microsoft Storage at IU is approved for PHI/critical data classifications with a few notable exceptions below.

NOT approved for:

  • Credit card and Payment Card Industry (PCI) data

  • Export controlled research data

  • Controlled Unclassified Information (CUI)

  • Advancement donor gift agreements and wealth information

Some of our data exists within the bounds of University Public Data, which has no special processing requirements. Examples of Public Data include generally available event information and public PII, such as names, emails, and usernames. See more:

We also process a good deal of University Internal Data, which should not be published to public sites and should remain on University systems (such as Microsoft365). Internal Data includes non-public PII, such as phone numbers. It also includes physical security concerns, such as internal floor plans. See more:

We also process some University Restricted Data. This data in no means should leave University systems, and access controls should be closely monitored to ensure that no additional party — other than those working directly with the information — may access it. This includes student academic transcripts, class schedule, date of birth, gender, pronouns, home address, and more. Please consult and the to determine if the data you are using is considered Restricted. If you are using, processing, or storing Restricted data, you MUST COMPLY with . Additionally, per TEDxIndianaUniversity policy, you must name folders with Restricted data in this convention: TEDxRESTRICTED-{topic/name}such as TEDxRESTRICTED-HighSchoolGPAs

Although unlikely, it is possible that we may process or store University Critical Data, such as passport or visa information, state ID information, or credit card information. . Like Restricted data, you MUST COMPLY with . If the data isn't something you'd normally give out to a friend, it is likely Critical data; always check the to ensure you understand your obligations. Additionally, per TEDxIndianaUniversity policy, you must name folders with Critical data in this convention: TEDxCRITICAL-{topic/name}such as TEDxCRITICAL-SpeakerVisa. You are also required to monitor and strengthen access controls to permit the minimum number of parties required. If you are finished with the data, delete the information... and then delete it from the trash or recycle permanently. For Critical data, avoid using traditional email or messaging for sharing or collecting the files. Instead, consider using .

⚡
💻
🔓
What is public data?
What is University-internal data?
What is restricted data?
Data Sharing and Handling tool
protective measures in Microsoft365
Learn more about what is considered Critical Data
protective measures in Microsoft365
Data Sharing and Handling tool
IU Secure Share
Data Sharing and Handling tool
protect data in Microsoft365