Information that's of high value to the university that contains personally identifiable information, financial or research data. The following table outlines the difference between the various security levels Select the Review Tab and click the Restrict Permission button
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |