Preloader

Questions? 662-280-5444

Student Handbook

Procedures for Securing Student Records

All student records will be maintained in a protected location with controlled access. Regulated access to records is given based on job level, and a certifiable need to view the record. Faculty and staff who have been given restricted access to view records will:

  • Make sure that all records are kept in a secure locked location.
  • Lock computer desktops and/or offices when departing a workstation.
  • Abstain from storing student records on the computer desktop. All student data should be warehoused on a secure network drive.
  • Certify that Leighton University laptops are kept in a secure location, whether on or off-campus. Laptops must be secured, and password protected whenever they are not in use.
  • Properly shred printed material that contains information not necessary for storage.
  • Preserve the confidentiality of student information by being aware of their surroundings when holding discussions with the student or with others who have a confirmable need to know the information.
  • Attend periodic training offered to faculty and staff to ensure that up-to-date security guidelines are recognized and being followed. This training will include an annual review of FERPA procedures and HIPAA.

The University is mindful of the confidentiality of student data. For that reason, access to confidential student data and databases is limited to duly authorized personnel. Leighton University requires that:

  • Security log tables are monitored
  • All users have individual accounts
  • User permissions are controlled by user classifications that control access to data
  • Documentation of site security measures and end-user responsibilities are maintained.

These practices apply both to information in the University's electronic record systems including admission, other student records including medical, conduct, and other records covered under HIPPA such as physician and mental health, fitness, disability, academic integrity violations, career services, and emails with confidential information.