Protect Your Data: Encrypt Your Device

There are a lot of ways to protect your data. For those who choose to store files on their local hard drive, a strong password is the first line of defense against threats. That helps prevent people from accessing your files, but there’s more you can do.

Encrypting your hard drive is a second way to guard your files and data from prying eyes. It’s fast and it’s easy! Basically, encryption scrambles your data, and only the person with the correct “key” (think password/passphrase) can put that puzzle together again.

Cybersecurity Awareness Month October 2022: See Yourself in Cybersecurity

We all play a role in each day in our own security. We put on a seatbelt or lock a door. We play a similar role in our digital and online security: we can take actions that improve it and reduce risks.

This October we encourage you to take steps that raise your awareness of cybersecurity in all your roles at the university and beyond. We're focusing on Phishing: how to identify it, report it, and protect yourself against it.

Phishing Help

What is Phishing?

Cyber criminals use email in malicious ways to gain access to data. Like a fisherman uses a hook to get a fish, the ultimate goal is to convince you to provide them with information they want. Phishing email often appears legitimate, so users fall for requests to click on links, open attachments, visit websites, or to respond to the sender with personal information.

Workstation Locking

The safety and security of our data is a top priority at UIS. In an effort to better protect your files, ITS implemented a computer security policy that will automatically lock office, classroom, and lab computers after 20 minutes of inactivity. This policy is based on a recommendation from The Office of University Audits.

ITS encourages you to lock your computer anytime you walk away from it, even for just a minute. To do so, press Ctrl+Alt+Del and then choose Lock this computer. Or press the Windows key and ‘L’.

Equipment Transfer and Disposal

Disposals

  • Disposals Disposal of Electronic Equipment (desktops & laptops only) will be handled by UIS Information Technology Services. Individual departments will need to complete an Interdepartmental Transfer in FABweb to transfer the equipment to UIS Information Technology Services, who will then complete data wiping, internal redistribution, and disposal. The new responsible COA and Org are 4-305002.

Protection of Electronic Information

Protection of Information in Electronic Media

Information and data maintained in electronic media on University computer systems are protected by the same laws and policies, and are subject to the same limitations, as information and communications in other media. Before storing or sending confidential or personal information, campus users should understand that most materials on University systems are, by definition, public records. As such, they are subject to laws and policies that may compel the University to disclose them.

Plan for Combating the Unauthorized Distribution of Copyrighted Material by Users of UIS Network

The Higher Education Opportunity Act (HEOA) is a reauthorization of the Higher Education Act. It includes provisions that are designed to reduce the illegal uploading and downloading of copyrighted works through peer-to-peer (P2P) file sharing.

UIS takes the following measures to comply with the requirements: