Technology Data Domain

Technology data typically includes information related to Vanderbilt's information technology infrastructure, systems, and operations  to manage the technology infrastructure, ensure system availability and security, and support the institution's overall mission and operations.

The Technology Data Domain is divided into Subdomains providing information on a more granular level.

Data Trustee: Shane Callahan

Data classification is a practice that helps us understand the value of our data and identify more sensitive data.  The more sensitive the data, the more cautious you must be about accessing and sharing it with others and the more protections it needs to safeguard it from mishandling or misuse.

Vanderbilt University has a Data Classification Policy that has categorized VU data into the 4 levels listed below. Data classification for transactional row level data are assigned at the Subdomain level.  However the same data may be classified differently dependent on the format of the data.  
*See the next tab for some domain specific data classification guidelines and examples.

Level 1 - Public Level 2 - Institutional OnlyLevel 3 - RestrictedLevel 4 - Critical
Intended for public release or distribution.Private to VU and should not be available to non-VU individuals without permission.Confidential by law or contract, or should not be shared with unauthorized persons.Confidential by law or contract and requires bespoke security requirements.

Visit the VUIT Cybersecurity website for more information and guidance on Data Classification. 

Subdomains

  • Datacenter Availability

    The Datacenter Availability subdomain focuses on the resilience, uptime, and operational continuity of physical and virtual infrastructure hosted within datacenters. This includes facilities management, power and cooling systems, network connectivity, hardware redundancy, failover configurations, and disaster recovery capabilities that ensure continuous access to critical data and services.

    Governance of this subdomain ensures that data systems are highly available, fault-tolerant, and aligned with business continuity and recovery time objectives (RTOs). It also encompasses monitoring, alerting, and incident response procedures to minimize service disruptions caused by hardware failures, natural disasters, or other unplanned outages.

    Data Steward: Rick Wheeler

    Data Classification:  Level 3 - Restricted

    Major Data Systems & Applications

    System NameWarehouseData Classification
      Level 3 - Restricted
  • CMDB

    The Configuration Management Database (CMDB) subdomain provides a centralized and structured repository for storing information about configuration items (CIs), their attributes, and the relationships between them. CIs can include hardware, software, systems, network components, services, and documentation that are critical to IT operations. The CMDB supports IT service management (ITSM) by enabling visibility, traceability, and control across the technology landscape.

    This subdomain underpins effective change management, incident resolution, impact analysis, and compliance by maintaining an accurate, current, and complete inventory of IT assets and their dependencies. It enables decision-makers to assess the operational impact of changes, monitor asset lifecycles, and align IT services with business needs.

    Data Steward: Chris Bransford

    Data Classification:  

    Major Data Systems & Applications

    System Name Warehouse Data Classification
  • VUIT Contracts

    The IT Contracts subdomain encompasses the creation, management, and governance of agreements related to information technology products, services, and solutions. These contracts include software licensing, hardware procurement, cloud services, consulting engagements, maintenance agreements, support services, and subscription models.

    This subdomain ensures that all contractual obligations, service levels, usage rights, data protection clauses, and termination conditions are clearly defined, tracked, and enforced. Effective management of IT contracts mitigates financial, legal, operational, and compliance risks, while aligning vendor deliverables with organizational goals.

    Data Steward: Kathryn Maggart

    Data Classification:  

    Major Data Systems & Applications

    System Name Warehouse Data Classification
         
  • System Logs & Events

    System logs are records generated by an operating system, applications, and various components of a computing environment. They provide a detailed account of system activities, errors, warnings, and other events.

    Data Classification:  

    Major Data Systems & Applications

    System and Log TypeData StewardDescription
    Domain Name transactions - Transaction LogsChris Bransford The Domain Name transactions subdomain pertains to the log data generated by the purchase of Domain Names on behalf of the university.
    Domain traffic logsEric Taylor The Domain Traffic Logs subdomain pertains to the capture and management of log data generated by domain traffic.
    Microsoft 365 -  Application LogsAli Behnam-Gilani The Microsoft 365 Logs subdomain encompasses the collection, management, and analysis of log data generated across Microsoft 365 services, including Exchange Online, SharePoint Online, OneDrive, Teams, and Azure Active Directory. These logs provide critical visibility into user activity, administrative actions, system events, and security-related incidents within the Microsoft 365 ecosystem.
    This subdomain supports operational monitoring, compliance reporting, threat detection, and forensic investigations by capturing detailed telemetry and audit trails.
    Oracle Logs (Access, Performance, Usage)Amanda Jacob The Oracle Logs subdomain refers to the structured collection, management, and analysis of log data generated by Oracle database systems, with a focus on access, performance, and usage insights.
    PeopleSoft Logs (Access, Performance, Usage)Jasen Ingram The Peoplesoft Logs subdomain refers to the structured collection, management, and analysis of log data generated by Peoplesoft database systems, with a focus on access, performance, and usage insights.
    Atomic Logs (Access, Performance, Usage)Jasen Ingram The Atomic Logs subdomain pertains to the capture, management, and analysis of log data generated by Atomic.
    Database Logs (Access, Performance, Usage)John Williams The Database Logs subdomain encompasses the systematic collection, management, and analysis of log data produced by database systems, with a focus on three critical categories: access, performance, and usage. These logs are foundational for ensuring data security, system reliability, compliance, and informed decision-making across the enterprise.
    Software Store Digital Assets - Transaction LogsChris Bransford Software resources available for teaching, learning and research available through the software store generated transaction logs that are remained by the Business Operations team.
    Saleforce Logs (Access, Performance, Usage)Dylan Platz The Salesforce Logs subdomain refers to the structured collection, management, and analysis of log data generated by Saleforce database systems, with a focus on access, performance, and usage insights.
    Storage LogsMike Arnold The Storage Logs subdomain involves the capture, monitoring, and analysis of log data generated by storage systems, including on-premises storage arrays, cloud-based object storage, and hybrid environments. These logs provide critical visibility into access activity, performance metrics, capacity utilization, and operational health of storage infrastructure.
    API Integration Logs & MappingJasen IngramThe API Integrations Logs subdomain pertains to the capture, management, and analysis of log data generated by API Integrations.
    Audit Trails & Compliance LogsGRCAudit trails and compliance logs are components of information security and regulatory compliance within organizations. They help track user activity and system changes, providing a detailed record of actions taken on data and systems.
    Container Orchestration Logs (Kubernetes, Docker)Andy Green; Heather MitchellContainer orchestration logs are essential for managing and monitoring containerized applications and services within a container orchestration platform and provide critical insights into the behavior, performance, and health of containers and the orchestration system itself.
    Authentication & Authorization EventsEric TaylorAuthentication and authorization events are critical components of identity and access management (IAM) and help ensure that users are who they claim to be and that they have the appropriate permissions to access resources.
  • Network Hardware

    The Network Hardware subdomain encompasses the physical infrastructure components that enable data transmission, connectivity, and communication across the network of the university. This includes routers, switches, firewalls, wireless access points, load balancers, and other critical devices that support internal and external data flows.

    Data Steward: Dave Matthews

    Data Classification:  

    Major Data Systems & Applications

    System NameWarehouseData Classification
       
  • ITSM (Tickets)

    The ITSM (Tickets) subdomain focuses on the structured capture, tracking, and resolution of IT-related incidents, service requests, problems, and changes through a formal ticketing system. This subdomain enables VUIT management of workflows, prioritize user needs, and ensure service continuity in alignment with ITIL (Information Technology Infrastructure Library) best practices.

    Data Steward: Chris Bransford

    Data Classification:  

    Major Data Systems & Applications

    System Name Warehouse Data Classification
         
  • Identity

    The Identity subdomain governs the creation, management, and use of digital identities across technology environmen of the university. It focuses on uniquely identifying users, devices, applications, and services to enable secure access to data and systems. This subdomain underpins authentication, authorization, role management, and access governance, and plays a central role in enforcing security, privacy, and compliance policies.

    Data Steward: Eric Taylor

    Data Classification:  

    Major Data Systems & Applications

    System NameWarehouseData Classification
       
  • Telephony

    The Telephony subdomain encompasses the management, governance, and integration of voice communication systems, including traditional landlines, Voice over IP (VoIP), unified communications platforms, and mobile telephony. This subdomain focuses on ensuring reliable, secure, and efficient voice communication services across the organization for internal operations, customer engagement, and external collaboration.

    Data within the telephony subdomain includes call logs, voicemail data, call routing configurations, usage metrics, and system performance statistics.

    Data Steward: Ali Behnam-Gilani

    Data Classification:  

    Major Data Systems & Applications

    System NameWarehouseData Classification
       
  • Code Repositories

    The Code Repositories subdomain encompasses the governance, management, and monitoring of version-controlled source code and software artifacts stored in platforms such as GitHub, GitLab, and Artifactory. These repositories are central to software development lifecycles, enabling collaboration, version tracking, secure code storage, and deployment automation.

    Data Steward: Heather Mitchell

    Data Classification:  

    Major Data Systems & Applications

    System NameWarehouseData Classification
     Github N/A 
     Artifactory N/A 
  • System Diagrams and Technical Configurations

    The System Diagrams and Technical Configurations subdomain encompasses the documentation, maintenance, and governance of architectural representations and configuration specifications that define how systems, applications, and infrastructure components are designed, connected, and deployed. This includes logical and physical diagrams, network topologies, data flow charts, API integration maps, and detailed system settings or parameter files.

    Data Steward: Technical area managers

    Data Classification:  

    Major Data Systems & Applications

    System NameWarehouseData Classification
    Confluence N/A 
     GitHub N/A 
     Tereform N/A 
  • ETL jobs

    The ETL Jobs subdomain focuses on the design, execution, monitoring, and governance of data pipelines that extract, transform, and load data across systems. ETL processes are foundational to data integration, enabling structured and timely movement of data from source systems into data warehouses, lakes, or reporting platforms for analytical and operational use.

    Data Steward: Shawn Taylor

    Data Classification:  

    Major Data Systems & Applications

    System NameWarehouseData Classification
       
  • Endpoint Management Data (Desktops, Laptops, Mobile Devices)

    This subdomain encompasses data related to the configuration, status, usage, and lifecycle of end-user computing devices including desktops, laptops, tablets, and mobile phones managed by the organization. It supports IT operations, security, compliance, and asset management by providing visibility into device inventory, health, performance, user access, software compliance, and patch status.

    Data Steward: Dane Vick

    Data Classification:  

    Major Data Systems & Applications

    System NameWarehouseData Classification
    Desktops N/A N/A
    Laptops N/A N/A
    Mobile DevicesN/AN/A
  • Metadata

    Metadata is essentially "data about data." It provides context and additional information about other data, making it easier to organize, understand, and manage. Metadata can be found across various fields, including digital files, databases, and other information systems.

    Data Classification:  

    Major Data Systems & Applications

    System Data StewardDescription
    Application Configuration & Deployment Metadata  This subdomain captures the metadata associated with the configuration, deployment, and release management of applications across environments (development, testing, staging, and production). It provides structured information about how applications are provisioned, integrated, and maintained, supporting DevOps, change management, and audit functions.
    Software License & Subscription MetadataChris Bransford This subdomain captures structured metadata related to software licenses, entitlements, subscriptions, and usage terms across the organization. It serves as the foundation for software asset management (SAM), cost optimization, compliance monitoring, and vendor contract alignment by detailing how software products are acquired, allocated, and consumed.
    Cloud Configuration and Policy MetadataHeather MitchellCloud configuration and policy metadata refer to the settings, rules, and contextual information that define how cloud resources are configured, managed, and secured.
    Data Retention & Legal Hold MetadataGRCData retention and legal hold metadata refer to the policies and information associated with the management, retention, and preservation of data, particularly in regards to legal requirements and compliance obligations.
  • Knowledge Base and Self-Service Portals

    This subdomain includes structured and unstructured data that powers knowledge articles, FAQs, how-to guides, and self-service workflows within IT Service Management (ITSM) platforms. It supports end users and IT staff by enabling efficient problem resolution, reducing ticket volumes, and promoting self-sufficiency.

    Data Steward: Chris Bransford

    Data Classification:  

    Major Data Systems & Applications

    System NameWarehouseData Classification
       
  • Service Level Agreement (SLA) Metrics and Reporting

    This subdomain captures data related to the measurement, tracking, and reporting of Service Level Agreements (SLAs) across IT services and business operations. It enables organizations to monitor service performance, ensure contractual obligations are met, identify areas for improvement, and support operational transparency.

    Data Steward: Chris Bransford

    Data Classification:  

    Major Data Systems & Applications

    System NameWarehouseData Classification
       
  • Vendor Risk Assessments

    Vendor Risk Assessment is a systematic process used to evaluate and manage potential risks associated with third-party vendors providing technology-related services.

    Data Steward: GRC

    Data Classification:  

    Major Data Systems & Applications

    System NameWarehouseData Classification
       
  • Data Classification & Sensitivity Tags

    Data classification is the process of organizing data into categories that allow for effective management and security.
    Sensitivity tags provide metadata attached to data elements, indicating their classification level and the handling requirements associated with them.

    Data Steward: GRC

    Data Classification:  

    Major Data Systems & Applications

    System NameWarehouseData Classification
       
  • Backup & Disaster Recovery

    Refers to storage backup and archiving

    Data Steward: Mike Arnold

    Data Classification:  

    Major Data Systems & Applications

    System NameWarehouseData Classification
       
  • Server & Virtual Machine Inventory

    Server and virtual machine (VM) inventory refers to the comprehensive listing and management of both physical servers and virtualized computing resources in the VUIT environment.

    Data Steward: Patrick Hawkins

    Data Classification:  

    Major Data Systems & Applications

    System NameWarehouseData Classification
       

Minimum Training & Requirements to Request Access to Technology Data

Departmental Approval required.

test

Not sure how to start?

Reach out if you don’t know where to begin. The Office of Data and Strategic Analytics Partnering Team collaborate with leaders and serve as trusted advisers.  Partners provide subject matter expertise and are available to assist with your data needs.

Request Help