Skip to content

2023

Artificial intelligence use guidelines from an IT leadership perspective

A magenta brain formed by a close-knit network of overlapping and intersecting lines on a black background and above a grid of magenta lines.

Artificial intelligence (AI) tools must be used with caution to avoid known pitfalls, such as bias, privacy violations, copyright infringement, and inaccuracy. These guidelines are intended to support institutional standards for privacy, safety, ethical practices, and data security.

Share this article:

ITS-UIT golf tournament decided by a tiebreaker

Scene from the 14th annual ITS-UIT golf tournament.

The winner of the 14th annual ITS-UIT golf tournament was decided by a tiebreaker. A UIT team ended up tying an ITS team but edged out the runner-up by posting the best scores on the lowest handicap holes.

Share this article:

Internal IT auditors: We're advocates, not adversaries

Hollie Andrus, chief audit executive (CAE) for the U’s Internal Audit department. Image courtesy of the University of Utah.

Chief Audit Officer Hollie Andrus’ Internal Audit team, which includes an IT audit division, is broadly responsible for independent and collaborative risk assessments and helping colleges, departments, and organizations better align with the university’s strategic goals and core values.

Share this article:

Shields up! Protect yourself online with these simple steps.

A white outline of a shield with a keyhole surrounded by circles of dotted and dashed lines on top of a purple-hued image of the Earth. The photo illustration includes ones and zeros, and technology icons to the left and right of the shield.

October, designated as Cybersecurity Awareness Month, is a good time to review the basics of cybersecurity — easy and common-sense ways to protect your data and devices from threat actors and cybercriminals.

Share this article:
Last Updated: 1/3/24