Services that provide security, data integrity, and compliance for institutional activities. Includes identity and access management, security consulting and educations, incident response and investigation, and security policy and compliance.

Categories (2)

Identity Services

Management of Identity Lifecycle. Necessary infrastructure and identity management system development and maintenance.

Articles (6)

Can I use Fax over IP (FoIP) for HIPAA?

Fax over IP (FOIP) is permissible for HIPAA protected information provided certain conditions are met including the use of an Xmedius account. Scanners and printers directly connected to an encrypted computers may be used, but Canon multifunction printers may not.

Compromised UMS User Account?

If you've recently been notified by the IT Helpdesk that your account was compromised and you are wondering what to do next, here are some ideas!

Links in Emails: Guidance

Guidance on email links and attachments, and mass emails Guidance on email links and attachments, and mass emails

Permitted and Restricted Systems for Data Storage and Data Processing

Many compliance programs have specific regulatory and local requirements regarding required controls. A chart of permitted systems for data storage provides information to users of data on what systems can be used to store or process each type of data.

Phishing emails

What to do if you receive a suspicious or phishing email

Use of Personally Owned Computers

If you use a personally-owned computer for University work, then you are responsible for properly securing it.