Information Protection @ MIT

Minimizing PIRN on Campus

Understanding Where PIRN Is

Each Business Process Owner or System Owner is expected to:

The following diagram illustrates the framework for risk management:

 

 
 

 

 

 

 

 

 

 

 

Limiting Access to PIRN

Each Business Process Owner or System Owner will establish a protocol that defines the rules, processes and/or systems for:

Business Process Owners and System Owners may delegate the above responsibilities to one or more individuals who have received training or education in information security and privacy.

back to top