Skip to main content
Information Protection @ MIT
archive site
Search form
Search
Secondary navigation
Contact
Home
The WISP
Overview of the WISP
Related Rules
Roles
Minimizing PIRN
Education
Third-Parties
Protecting Files
Monitoring and Enforcement
Appendix A
Appendix B
Appendix C
Appendix D
Appendix E
Data at MIT
The Risks to Data
What Needs Protecting?
How to Protect Data
Finding and Collecting
Retaining and Storing
Transmitting and Sharing
Removing and Destroying
Laws and Policies
Your Personal Data
Tools
Training
Resources
Definitions
This site is an archive. For MIT's updated Written Information Security Program, visit:
infoprotect.mit.edu
Contact
Email:
security@mit.edu