»Æ¹Ï¶ÌÊÓÆµ

Skip to main content
Back to Top
»Æ¹Ï¶ÌÊÓÆµ Logo

Information for:

  • Current Students
  • Alumni
  • Community
  • Faculty & Staff
  • Military

Resources

  • A-Z Index
  • Campus Maps
  • Libraries
  • Jobs & Careers
  • Portals
  • Shuttles
  • »Æ¹Ï¶ÌÊÓÆµ
  • Academics
  • About
  • Student Life
  • Research
  • Health
  •   Giving
Data @ AU
  • Governance
  • Management
  • Compliance
    • Overview
    • Record of Processing Activity
    • AU Policy Library »
  • Resources
    • Institutional Review Board »
    • Cyber Defense »
    • AU Analytics
    • Crystal Reports
    • Report Catalog
    • Data Training
  • Data Request
  • »Æ¹Ï¶ÌÊÓÆµ
  • Data @ AU

Data @ AU

»Æ¹Ï¶ÌÊÓÆµ ensures the comprehensive management of data including, but not limited to, the integrity, security, and usability of institutional data. Through standardization, quality, governance, and availability, »Æ¹Ï¶ÌÊÓÆµ promotes a data culture of awareness, responsibility, and confidentiality. 

AU encourages a culture of data self service through our training, tools, and resources, and strives to create a community of empowered data citizens to bring safety, value, and understanding to all data users on campus. 

Tools + Resources

  • Data Request
  • Data Training
  • Record of Processing Activity
  • AU Analytics

Data Governance + Management

Governance

Data Governance Structure will demonstrate accountabilities for the data assets of the organization to ensure proper use and handling of data being read, created, collected, reported, updated or deleted.Governance

Management

Data Management includes the development, execution, and supervision of plans, policies, programs, and practices that deliver, control, protect, and enhance the value of data and information assets throughout their lifecycles.Management

Security

Cybersecurity refers to preventative methods used to identify potential threats and protect information and information systems from unauthorized access, compromise or attack through identity management, risk management and incident management.Security

Compliance

Compliance with regulations, laws, and policies (FERPA, HIPAA, Open Records Act, GDPR, GLBA, PCI-DSS) in addition to regular training, monitoring and auditing are necessary to ensure the security and integrity of institutional data.Compliance
University Shield

»Æ¹Ï¶ÌÊÓÆµ

1120 15th Street, Augusta, GA 30912

  •   Campus Maps
  •   Campus Contacts
  • A-Z Directory
  • Degrees & Programs
  • Employment
  • Accessibility
  • Accreditation
  • Campus Safety
  • Compliance Hotline
  • Privacy Notices
  • Title IX / Sexual Misconduct
Apply Now Give Now

© 2025 »Æ¹Ï¶ÌÊÓÆµ