Information Security Resources

The following are links to information security Resources that will help you protect against identity theft and secure confidential information.

Combat E-mail Viruses and Spam

Data Sanitization Guidelines

E-mail and Electronic Communications Guidelines

Encryption Security Guidelines

Handling Confidential Information

Information Security Contract Language Guidelines

Level 1 - Confidential Data

Level 2 - Internal Use Data

Level 3 - Public Data

Malicious Software on Web Sites

Mobile Computing Guidelines

Pharming: A Dangerous Form of Spoofing

Portable Electronic Storage Media Guidelines

Protect your Computer

Reporting a Lost or Stolen Computer or Electronic Storage Device Guidelines

Responsible Student Computing

Safe Disposal of Electronic Storage Media Guidelines

Spam/Phish Alerts

Spam, Spoofing, and Phishing E-mail

Wireless Access Guidelines