Skip to content

Main Navigation

Posts

This IT security rule helps protect U data. Are you following it?

The U has a rule to protect institutional data — and us.

If the university and its community members don’t comply with Rule 4-004C: Data Classification and Encryption, they not only open the door for potential malicious attacks, they can also be held liable for not safeguarding the data.

Share this article:

Top IT resources for U students, faculty, and staff

IT resources available to U students include laptops from Marriott Library.

Whether you are a new or returning student, faculty member, or staff member, these five IT resources/services will prepare you for the year ahead and set you up for success.

Share this article:

IT security policies are critical to the U's mission

IT policies are critical to the U's mission

If you’re the average University of Utah faculty or staff member, it’s possible you’ve never read the U’s information technology and IT security policies. Whether you have or have not, we all must follow them — and for good reason, too.

Share this article:

Town hall recap: Telecommuters must follow IT security policies

Steve Hess, chief information officer

During a recent U town hall, CIO Steve Hess addressed the IT security issues that come with telecommuting, including concerns about data privacy and work on personal devices. He urged employees (and students) to review and follow university IT regulations.

Share this article:

Securing payments on a mostly cashless campus

A person at a laptop computer conducts a credit card transaction online.

To keep vast sums of restricted credit card processing data locked down, the university adheres to strict payment card industry data security standards.

Share this article:

Don't give up the keys to the castle - be identity smart

Illustration of a digital fingerprint on a computer's motherboard

Ahead of Identity Management Day on April 13, Chris Stucker, associate director for Identity & Access Management, discusses how we can all help prevent attackers from compromising our identities, and breaching the university’s defenses.

Share this article:

Several university IT security policies receive updates

The Information Security Office logo

The Academic Senate recently approved changes to three items and the addition of one procedure under Policy 4-004: Information Security Policy, which the Information Security Office requested in order to stay current with the ever-changing cybersecurity landscape and organizational requirements.

Share this article:

Node 4

Our monthly newsletter includes news from UIT and other campus/ University of Utah Health IT organizations, features about UIT employees, IT governance news, and various announcements and updates.

Subscribe

Categories

Featured Posts

Last Updated: 4/13/21