Child pages
  • Access and Compliance Agreement
Skip to end of metadata
Go to start of metadata

Completion of the ACA is required

If you are being notified you need to complete the ACA please log in to MyUAlbany and complete the task by navigating here. If you do not have an active University at Albany account and are unable to log into MyUAlbany, you can receive instructions for activating your account by going to the help page Activate your UAlbany account for access to IT Services. For further assistance, please contact the ITS Service Desk at (518) 442-3700.


Faculty, staff, volunteers and affiliates at the University at Albany are required to collect and use a wide variety of information. Grades, research data, application submissions, health records, and financial transactions are just some of the types of academic and business records we use in the course of performing our work.

As criminal fraud incidents involving stolen or lost information have proliferated, states and the federal government have imposed increasingly stringent requirements on businesses and government entities to ensure that adequate protections are applied to collections of business records containing sensitive, personal information.

The Family Education Rights and Privacy Act (FERPA) and the Health Insurance Portability and Accountability Act (HIPAA) are two examples of federal legislation that require specific levels of protection and authorize penalties for failure to comply with those requirements. Two statutes in New York State, the SHIELD Act and the Social Security Protection law, impose severe penalties for the mishandling and misuse of social security numbers. For a complete list of laws, regulations and policies you are responsible for, please click here.

Because of the possible sanctions the University could suffer resulting from the loss or exposure of regulated information, and the increasing threats targeting that information, it is vitally important that University employees accept the role of informed guardians of campus business records.

By agreeing to the Access and Compliance Agreement, you agree to comply with the applicable laws and University policies and procedures governing the handling and use of those records.  Your efforts in protecting information vital to the campus's mission of teaching, learning, and research are greatly appreciated.





I understand that I am being granted access to information and data that may contain records subject to federal or state regulations ("regulated data") regarding privacy and confidentiality, and that I may handle other information considered Personal, Private, and Sensitive. My continued access to this information is based on my agreement to comply with the following terms and conditions:


  • I will comply with all state and federal laws, international laws, and SUNY and University policies that govern access to and use of information about employees, applicants, students or donors. (1)
  • My right to access this is strictly limited to the specific information and data that is relevant and necessary for me to perform my job-related duties.
  • I am prohibited from accessing, using, copying or otherwise disseminating regulated data that is not relevant and necessary for me to perform my job-related duties
  • I will not share regulated data unless explicitly authorized to do so, and in no instance will I share regulated data with third parties without appropriate authorization.
  • I will sign-out of electronic records systems when I am not actively using them.
  • I will keep my account credentials (e.g., NetID, password) confidential, and will not disclose or share them with anyone. (Please note: Any request for your UAlbany password(s) in any format, by phone, email, or in person, should be considered fraudulent.) Note: Access to certain resources containing regulated or sensitive information may require me to use multi-factor authentication (i.e.,2-Step Login).

I understand that violations of this agreement may result in the revocation of my access privileges to University information systems, may result in appropriate administrative action, including, but not limited to, disciplinary action, and may also subject me to prosecution by federal or state authorities.


Definition of Personal, Privateand Sensitive Information (PPSI)

New York State Cyber Security Policy P03-002: Information Security Policy
Rev. Date: March 10, 2017

Personal, Private, and Sensitive Information (PPSI): Any information where unauthorized access, disclosure, modification, destruction or disruption of access to or use of such information could severely impact the State Entity (SE), its critical functions, its employees, its customers, third parties, or citizens of New York. This term shall be deemed to include, but is not limited to, the information encompassed in existing statutory definitions[1]. PPSI includes, but is not limited to (1) :


  • Information concerning a person which, because of name, number, personal mark or other identifier, can be used to identify that person, in combination with:
    • Social Security Number;
    • driver's license number or non-driver  identification  card number;
    • mother's maiden  name; or
    • financial account identifier(s) or other information which would permit access to a person's financial resources or credit.
  • Information used to authenticate the identity of a person or process (e.g., PIN, password, passphrase, biometric data). This does not include distribution of one-time-use PINs, passwords, or passphrases.
    • Information that identifies specific structural,  operational,  or technical information, such as maps, mechanical or architectural drawings, floor plans, operational plans or procedures,  or other detailed information  relating to electric, natural gas, steam, water supplies, nuclear or telecommunications systems or infrastructure,  including associated facilities, including, but not limited to:
    • training and security procedures  at sensitive facilities and locations as determined by the Office of Homeland  Security (OHS);
    • descriptions  of technical processes  and technical architecture;
    • plans for disaster recovery and business continuity;  and
    • reports, logs, surveys, or audits that contain sensitive information.
  • Security related information (e.g., vulnerability reports, risk assessments, security logs).
  • Other information that is protected from disclosure by law or relates to subjects and areas of concern as determined by SE executive management.

   

 (1) a) State, Federal, International Laws, 

Information Security Policy P03-002

Internet Security and Privacy Act 

Family Education Rights and Privacy Act (1974)

Health Insurance Portability and Accountability Act of 1996 (HIPAA) 

FTC Red Flag Rules 

Payment Card Industry Digital Security Standards

General Data Protection Regulations (GDPR)

General Business Law §§399-ddd399-h(1)(c),(d),(e); 899-aa(1)(a)(b);

Public Officers Law, §§86(5); 92(7), (9);

State Technology  Law §§202(5)208(1)(a).

b) SUNY and University at Albany policies

Access to Personal Information Maintained by State University of NY 

Compliance with FERPA 

Compliance with Personal Privacy Protection Law