The Office of Information Technology at the University of Central Oklahoma has taken measures to ensure that information can only be accessed or modified by those authorized to do so. This integrity of data is protected not only by restricting access, but also through maintaining rigorous authentication practices and following a set of best practices used to assure that data integrity will not be threatened by environmental hazards, such as heat, dust, and electrical surges. The exact methods used by the Office of Information Technology to ensure Data Integrity is available for your review.