Information Technology Services - nav image

7.3 Target Systems and Controllers

Harvard Enterprise Security Policy:

Policy Excerpt
Systems that might be targets of special interest to hackers because of the information they contain or the resources they control need special protections. This category includes systems containing high-risk confidential information and facility access or control systems as well as systems containing valuable research data.

HLS Policy:

HLS has several methods of protecting target machines. The methods and technical mechanisms vary depending upon the classification of data. HLS ITS will work proactively with data owners to secure data and target systems with correct level of physical and logical security.

Approved Solution:

Contact Security(@law.harvard.edu) for additional assistance.

Last modified: November 06, 2008

© 2014 The President and Fellows of Harvard College. All rights reserved.