INFORMATION TECHNOLOGY

Protecting The Integrity of Information

  • Apply system updates to your operating system and application software on a regular basis.                  
  • Always have your anti-virus software running and the data definitions up to date.
  • Make sure that computers are reformatted by Desktop Support prior to them going to surplus property to ensure that data is removed and not recoverable. Deleting files, moving files to "trash," and emptying the "trash" file is insufficient because the files can still be recovered.                  
  • Ensure that functions that enable data sharing on an individual workstation are either turned off or set to allow access only to authorized personnel.                  
  • Encrypt sensitive files. Use IT Security-approved encryption methods only.
  • Ensure that remote access (from off campus) connections are done securely using SSH or VPN
Last Updated: 6/27/22