[ skip to content ]

Toggle Mobile Menu

Computing Security

More Information about this image

Engineering & Computational Sciences Building

Safe Computing

Dental Hygiene Student

Secure your computer and practice safe browsing habits to protect yourself in today's technological world.

Online Scams

Tri-cities HEC Computer Lab

Learn how to recognize online scams so you don't become a victim.

Storing Regulated Data

Keyboard

We have multiple options for data storage, but not all options are appropriate for confidential or restricted data.


Incident Reporting

Student works on paper

Information on reporting computer security violations.

Systems Assessment

Internet

Completing an analysis and assessment is extremely important, especially in today's advanced technological world.

Computing Policies

ITS Key

IT Policies and Standards direct and guide University practices, help ensure legal compliance and assist the University in reaching long-term goals.



Information Security Program

The Information Security Program provides a high-level view of the University's security controls and elements used to satisfy the laws and regulations relevant to information security. The Information Security Officer has delegated authority for the selection and implementation of security controls and manages the overall security program.