Skip to content

Posts

ISO: Do not use Slack for university business

The Slack logo

The U does not have a license for Slack, so it is not approved for university business. It’s also not approved for creating, processing, transmitting, or storing restricted and sensitive data as required by university policy.

Share this article:

IT security tip: Going beyond the basics

An illustration of two people sitting next to a laptop that has a shield on its screen. On the right is a transparent purple box with white lines to represent text. In the background is a purple wall with shield, document, email, lock, file, cloud, and magnifying glass icons.

While basic IT security practices will help you protect your data, you can take additional steps to make a data breach or cyberattack more difficult for criminals and incident response easier for you.

Share this article:

A data privacy 'GUT Check' for synthetic media like ChatGPT

An illustration of a brain made of geometric shapes on an orange background filled with letters, numbers, and thin lines connected by dots.

With the rise of synthetic media like ChatGPT, it’s important to increase our technological literacy and implement healthy, curious, and cautious data privacy habits to protect our personal information.

Share this article:

Memo: Remove account access for terminated faculty, staff

An illustration of two circles on a blue background containing binary code (ones and zeroes). In the left circle is a blue folder with a closed white lock on it. In the right circle is a red folder with an open white lock.

On March 1, Chief Financial Officer Cathy Anderson and Senior Vice President for Academic Affairs Mitzi Montoya emailed the Council of Academic Deans about appropriately managing account access and university data when faculty and staff leave the U or transfer to another unit.

Share this article:

Explainer: Physical and Facility Security Rule (4-004F)

A photo illustration of a white translucent shield with a keyhole overlaying a darkened image of the University of Utah's Park Building.

Rule 4-004F outlines the requirements to protect university buildings, facilities, IT systems, network and power cables, and other university property, as well as U community members, from myriad threats.

Share this article:

Explainer: Change Management Rule (4-004E)

The Change Management process

The rule ensures that all relevant parties know about IT changes and that the U’s IT systems and resources work properly after any changes. It also makes it easier to prevent unsuccessful changes and implement similar changes in the future.

Share this article:

IT security tip: How to safely dispose of electronic devices

A faded white recycle icon below a pile of electronics.

When you throw away, donate, or recycle an electronic device, you may inadvertently disclose sensitive information that could be exploited by cybercriminals, which is why it's important to secure them properly first.

Share this article:

Node 4

Our monthly newsletter includes news from UIT and other campus/ University of Utah Health IT organizations, features about UIT employees, IT governance news, and various announcements and updates.

Subscribe

Categories

Featured Posts

Last Updated: 4/11/22