Michigan Technology Community News
Skip to content
  • Top Stories
  • Projects & Services
  • Events
  • Professional Development
  • Safe Computing
  • Campus News
  • About

Request Process for Next-of-Kin Access to U-M Accounts

By Bridget Weise Knyal, ITS Privacy Office | July 24, 2024
0 Comment

Information & Technology Services’ (ITS) Information Assurance (IA) team has taken steps to streamline the process for next of kin to gain access to information contained in personal email, files, or other digital resources of a deceased or incapacitated holder of a U-M account.

The process for Requesting Account Access for Next of Kin and Others details required steps and documentation, and includes a new form to submit a request to the ITS Service Center.

Reminder: It is important that units collaborate closely with their UHR business partner in the event of an employee’s death.

As part of the effort to facilitate the next-of-kin process, ITS Information Assurance has clarified the guidance on how to Use “Personal and Private” folders to Protect Privacy. The updated information reminds U-M community members that they are strongly encouraged to store personal files, folders, email, or other personal data in non-UM personal accounts.

Folder icon with the words "Personal and Private" below.

The guidance also includes a clear recommendation about the use of personal and private folders as it relates to certain situations when an individual leaves U-M: Using Personal and Private folders and labels for non-work-related information facilitates sharing that information in the event you are deceased or incapacitated.

Safe Computing
account access personal information security

Related Posts

  • Over the Shoulder Shot of a Young Woman at Home Lying on a Couch and Using Tablet Computer in Horizontal Landscape Mode for Reading News about Technology.
    New Safe Computing Page – Misinformation: How to Spot and Stop It
  • Practice online hygiene
    Protect privacy and practice online hygiene
  • Hacker behind a laptop
    Refreshed DCE101 Training: Cybersecurity and Data Protection at U-M
  • Safe computing while traveling
    Tips for Traveling Safely with Technology
Post navigation
← LSA Technology Services partners with ITS to migrate load balancing services Leadership Profile: Greg Laman →

RSS ALERTS

RSS PHISHING

TRENDING TAGS

Academic Innovation AI analytics apps award business CIO CoE collaboration community service CoP COVID-19 culture cybersecurity data Dearborn education engineering Google governance hardware health HITS infrastructure innovation Leadership Message LSA medicine Michigan Medicine network online learning People privacy profile research security social software students symposium teaching Tech Tip training videoconferencing WiFi

ARCHIVES

Office of the VPIT-CIO

  • About the VPIT-CIO
  • Information Technology Policies
  • IT Strategy
  • IT Governance
  • Security & Privacy

Michigan Technology

  • About Michigan Technology
  • Community Resources & Events
  • History of IT at U-M
  • Professional Development
  • U-M IT Providers

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© The Regents of the University of Michigan
Subscribe to the Michigan Technology Community News Email Digest
Iconic One Pro Theme | Powered by Wordpress