U-M Windows Forest
ITS Windows-Based Services
How-To Documents
Frequently Asked Questions
Help
Contact Us
U-M Windows Forest Main

Guidelines for Release of Security Log Information

Objective

Protect the privacy of individuals whose personal information may be captured in security logs in accordance with laws, regulations and university policies while supporting the normal operation, administration and troubleshooting of systems and networks.

Applicability

These guidelines apply to security logs, such as Kerberos and Windows logs, which capture security information associated with users of university information services. Users (whose private personal information is captured) may include faculty, staff, students, alumni and other individuals who access university information services. The guidelines specifically address requests from unit system administrators to access security log information associated with computers that are under their purview for troubleshooting purposes. Requests to access log information associated with a specific individual are also addressed.

General Guidelines

Responsibilities

ITS System Administrator (Controlling the Security Log):

Unit System Administrator (Requesting Access to Security Log):

User Advocate:

Data Steward:

References

Responsible Use of Information Resources (SPG 601.07

Privacy and the Need to Monitor and Access Records (SPG 601.11)

Institutional Data Resource Management Policy (SPG 601.12)

Information Security Policy (SPG 601.27)