Search9 Results

This article describes the need and use of the University's Standards for Safeguarding Information when University data is accessed by third-parties. This can take the form of a rider, often Rider C, or a stand-alone Safeguarding Data Agreement.
This Article provides some proactive measures to minimize phishing impact, some ways to react to phishing, and actions to take if you think you were successfully phished.
This article describes signs of phishing, actions that criminals use to trick victim in thinking phishing message are real and phishing training that is offered with simulating message.
This introductory article on phishing provides a description of phishing, examples of spoofed senders, purposes and types of phishing as well as associated risks.
Request for Information Technology Review - Form Guidance
UMS Official Policy Document for Vulnerability Management
This article outlines the proper response timelines for US:IT staff to identify and remediate vulnerabilities in the IT systems they manage. The timelines are defined in the UMS Vulnerability Management Program
The Information Security Office acknowledges the value of use of cloud based solutions in courses. This article provided guidance on how to stay within FERPA requirements when using solutions non-university solutions that contain data or require access by students.
Guidelines for collecting data in forms on public campus websites. This applies primarily to WordPress, though some information may be helpful for other services.