Skip to content

Explainer: Remote Access Rule (4-004H)

An illustration of a man standing before a wall with a keyhole opening. Through the opening, a bright line shines out from a city skyscape.

Rule 4-004H outlines the requirements and user responsibilities when accessing the university’s IT resources, information systems, and information assets remotely (e.g., Citrix and virtual private network).

Share this article:

Travel tips to avoid becoming the victim of a cybercrime

Person on an airplane typing on a laptop computer.

Swimsuits and sunblock aren’t the most important things to think about when packing your bags. As you embark upon your next trip, access the Information Security Office offers some best practices to keep your travel free from cybercriminal meddling.

Share this article:

ISO: Do not use Slack for university business

The Slack logo

The U does not have a license for Slack, so it is not approved for university business. It’s also not approved for creating, processing, transmitting, or storing restricted and sensitive data as required by university policy.

Share this article:
Last Updated: 4/26/23