Information Technology Services (ITS)
University of Memphis Photo
Security Related Topics

Technology/Security Best Practices

Passwords

To further maintain the security of the University’s systems, effective February 2013, the University of Memphis will require annual password changes for all UUID accounts. Your password allows access to University data and networked resources. 

  • Guidelines and additional information can be found on ITS’s Password Security website.

Anti-Virus Software

Viruses can corrupt data and slow down entire computer networks.  To protect your computer from infection, install anti-virus software, and update when prompted. 

  • University owned computers/laptops can get anti-virus software installed at no cost. Contact the umTech Helpdesk at 678.8888 to request this service by your Local Support Provider (LSP).

Spyware and Malware

Spyware or malware (malicious software) is software installed on your computer without your knowledge.  It may be installed while you are downloading an application or using a file sharing program online. It is recommended to use an approved SafeConnect Spyware product.


Operating Systems

New security concerns develop frequently.  The best way to protect your computer’s operating system is to install updates to the operating system.  Mac and Microsoft updates are FREE to download.


 Report a Technology Incident or Report Internet/Security Abuse


Confidential Data Best Practices

Storage

Encrypt all confidential data that is stored on a laptop or other portable media.  You can encrypt the entire hard drive of your laptop or an entire USB drive to ensure that the data cannot be viewed by anyone else. 

University owned laptops and portable media devices must be encrypted.  Local Support Providers (LSPs) in each department are responsible for assisting faculty and staff with this process.   Details and software information.

Delete/Erase

Deleting files from your computer, portable laptop or electronic storage media does not permanently remove the data.  The data must be overwritten before disposal. 

Security Standards and Procedures


Campus Data Security


Classification of University Data

University Hardware and Software Standards

University Policies

Center for Information Assurance

Microsoft Security Central

Mac OS X Security Features

Gartner Security & Privacy

Text Only | Print | Got a Question? Ask TOM | Contact Us | Memphis, TN 38152 | 901/678-2000 | Copyright 2013 University of Memphis | Important Notice | Last Updated: 
Information Technology Services | 100 Administration Bldg. | Phone: 901.678.8888 | Email: UMTech@memphis.edu
Last Updated: 3/25/14