Skip Navigation

Friday August 2nd, 2013

Security Terms, Virtual Server Hosting

Summary: Use of the IAT Virtual Server Hosting service requires agreement to these security terms of service.

Data Restrictions

The client is responsible for providing appropriate data security controls, such as appropriate passwords, encryption, and back-ups, for information stored on the IAT Virtual Server Hosting Service.  The virtual machines are provided as essentially “bare metal” and do not have host security controls beyond what the client implements.  If you have questions about security controls, please email security@uci.edu.

The IAT Virtual Server Hosting Service is only for low data classification information.  The client agrees to not store, copy, transfer, hold, pass, or in any other way use unencrypted restricted data (see definitions below) on an IAT virtual machine or on the IAT Virtual Server Hosting service network.

Restricted Data:

"Restricted data" is a particularly sensitive category of confidential data. UC defines restricted data as follows:

Any confidential or personal information that is protected by law or policy and that requires the highest level of access control and security protection, whether in storage or in transit.  The term should not be confused with that used by the UC-managed national laboratories where federal programs may employ a different classification scheme.

At UCI, restricted data includes, but is not necessarily limited to

Personal Identity Information (PII):

Unencrypted electronic information that includes an individual’s first name or initial, and last name, in combination with any one or more of the following:

*Credit card information is also regulated by the Payment Card Industry (PCI) Data Security Standard.