This site requires JavaScript to be enabled
An updated version of this article is available

Procedure to Handle Requests for Records or Information

657 views

13.0 - Updated on 2024-06-24 by James Clark (jclark)

12.0 - Updated on 2024-06-20 by James Clark (jclark)

11.0 - Updated on 2024-06-03 by Dinesh Budhathoki (dbudhathoki)

10.0 - Updated on 2023-11-06 by Karen Neuhoff (kab)

9.0 - Updated on 2023-11-06 by Deem Alothaimeen (deem)

8.0 - Updated on 2023-11-06 by Deem Alothaimeen (deem)

7.0 - Updated on 2023-11-03 by Joseph Rivera (josephrivera)

6.0 - Updated on 2023-10-27 by Dinesh Budhathoki (dbudhathoki)

5.0 - Updated on 2023-06-30 by Kendall Williams (kendallrw)

4.0 - Updated on 2021-08-05 by Rosa Miller (rosam)

3.0 - Updated on 2020-05-29 by Rosa Miller (rosam)

2.0 - Updated on 2019-08-14 by Rosa Miller (rosam)

1.0 - Authored on 2018-05-10 by Rosa Miller (rosam)

Information about the University of Chicago faculty, staff, students, or other affiliates is covered by certain privacy laws, University policies, and regulatory requirements. All such requests must follow this procedure to ensure the proper protection of both those individuals and the University.

What Information Is Covered

This procedure covers information requests related to non-public information about or actions taken by any member of the University of Chicago community where such records are under the management and control of IT Services. This also covers general records when an individual is not specifically named. Examples include:

Note: This procedure must be followed whether or not the requester is an external party (e.g., law enforcement, government agency) or internal (e.g., human resource management, business unit management, or dean's office).

Procedure

When a records or information request is received:

  1. Forward that request to security@uchicago.edu or call 773.702.2378.
  2. IT Security will obtain clarification of the request, if needed, and send it to the University's Office of Legal Counsel.
  3. Legal Counsel will evaluate the request and approve, deny, or ask for additional information. They may go through IT Security or make the request directly to the requester for the additional information.
    • If the request is approved, IT Security will notify the requesting party and pass the approval to the internal group that can provide the information requested. The information provided must not be broader than the specific scope that was approved.
    • If the request is not approved, IT Security will notify the requesting party.

These requests are often confidential in nature. Involved parties must disclose only the existence of the information request to those needed to follow this procedure, and then only what is needed to complete the process.

Under no circumstances may information or records be provided without Legal Counsel approval.

Contact IT Security at security@uchicago.edu with any questions about this procedure.


Last modified 2021-08-05 14:53:38