Workstation Locking

The safety and security of our data is a top priority at UIS. In an effort to better protect your files, ITS implemented a computer security policy that will automatically lock office, classroom, and lab computers after 20 minutes of inactivity. This policy is based on a recommendation from The Office of University Audits.

ITS encourages you to lock your computer anytime you walk away from it, even for just a minute. To do so, press Ctrl+Alt+Del and then choose Lock this computer. Or press the Windows key and ‘L’.

Equipment Transfer and Disposal

Disposals

  • Disposals Disposal of Electronic Equipment (desktops & laptops only) will be handled by UIS Information Technology Services. Individual departments will need to complete an Interdepartmental Transfer in FABweb to transfer the equipment to UIS Information Technology Services, who will then complete data wiping, internal redistribution, and disposal. The new responsible COA and Org are 4-305002.

Protection of Electronic Information

Protection of Information in Electronic Media

Information and data maintained in electronic media on University computer systems are protected by the same laws and policies, and are subject to the same limitations, as information and communications in other media. Before storing or sending confidential or personal information, campus users should understand that most materials on University systems are, by definition, public records. As such, they are subject to laws and policies that may compel the University to disclose them.

Plan for Combating the Unauthorized Distribution of Copyrighted Material by Users of UIS Network

The Higher Education Opportunity Act (HEOA) is a reauthorization of the Higher Education Act. It includes provisions that are designed to reduce the illegal uploading and downloading of copyrighted works through peer-to-peer (P2P) file sharing.

UIS takes the following measures to comply with the requirements:

Phishing

Phishing is when suspicious links are embedded in email messages, texts, or websites that might look legitimate at first glance. Those behind the attacks hope you will take the bait and click so they can try illegal tactics to steal your information.