Computing Security

Secure your computer and practice safe browsing habits to protect yourself in today's technological world.

Learn how to recognize online scams so you don't become a victim.

We have multiple options for data storage, but not all options are appropriate for confidential or restricted data.

Information on reporting computer security violations.

Completing an analysis and assessment is extremely important, especially in today's advanced technological world.

IT Policies and Standards guide University practices, help ensure legal compliance and assist the University in reaching long-term goals.

Information Security Program

The Information Security Program provides a high-level view of the University's security controls and elements used to satisfy the laws and regulations relevant to information security. The Information Security Officer has delegated authority for the selection and implementation of security controls and manages the overall security program.