IT Security

IMPORTANT! Suspected Spam or Phishing Email

With rapid and continuing technology advances, the Information Security Office (ISO) is implementing the University’s Information Security (IS) program to establish security measures to protect the information technology infrastructure and provide a sustainable consistent approach to information security safeguards and measures that can be replicated across paper and electronic files, systems, and transactions.

The IS program provides the framework and practices for all business functions, departments, faculty, staff, and students to use in securing their information.  It is also designed to provide direction and assistance for developing and implementing information security controls that reduce the risk to 51ºÚÁÏ information regardless of the medium containing the information.


Guiding Principles

The following principles guide the development and implementation of the 51ºÚÁÏ Information Security Program.

51ºÚÁÏ Information Security Program

  1. The 51ºÚÁÏ Information Security program is and shall continue to be designed to:

    • Ensure the confidentiality, integrity and availability of 51ºÚÁÏ  information;
    • Protect against any anticipated threats or hazards to the security or integrity of the information; and
    • Protect against unauthorized access to or use of the information that could result in substantial harm or inconvenience to anyone.

  2. 51ºÚÁÏ sensitive information is:

    • A critical asset that shall be protected; and
    • Restricted to authorized personnel for official use

  3. 51ºÚÁÏ recognizes that Information Security is:

    • A cornerstone of maintaining public trust;
    • Managed to address both business and technology requirements;
    • Risk-based and cost-effective;
    • Aligned with 51ºÚÁÏ priorities, industry best practices, and government requirements;
    • Directed by policy but implemented by business owners; and
    • Applied holistically, regardless of medium.