Phishing Help

What is Phishing?

Cyber criminals use email in malicious ways to gain access to data. Like a fisherman uses a hook to get a fish, the ultimate goal is to convince you to provide them with information they want. Phishing email often appears legitimate, so users fall for requests to click on links, open attachments, visit websites, or to respond to the sender with personal information.

Workstation Locking

The safety and security of our data is a top priority at UIS. In an effort to better protect your files, ITS implemented a computer security policy that will automatically lock office, classroom, and lab computers after 20 minutes of inactivity. This policy is based on a recommendation from The Office of University Audits.

ITS encourages you to lock your computer anytime you walk away from it, even for just a minute. To do so, press Ctrl+Alt+Del and then choose Lock this computer. Or press the Windows key and ‘L’.

Equipment Transfer and Disposal

Disposals

  • Disposal of Electronic Equipment (desktops & laptops only) will be handled by UIS Information Technology Services. Individual departments will need to complete an Interdepartmental Transfer in FABweb to transfer the equipment to UIS Information Technology Services, who will then complete data wiping, internal redistribution, and disposal.

Protection of Electronic Information

Protection of Information in Electronic Media

Information and data maintained in electronic media on University computer systems are protected by the same laws and policies, and are subject to the same limitations, as information and communications in other media. Before storing or sending confidential or personal information, campus users should understand that most materials on University systems are, by definition, public records. As such, they are subject to laws and policies that may compel the University to disclose them.

Plan for Combating the Unauthorized Distribution of Copyrighted Material by Users of UIS Network

The Higher Education Opportunity Act (HEOA) is a reauthorization of the Higher Education Act. It includes provisions that are designed to reduce the illegal uploading and downloading of copyrighted works through peer-to-peer (P2P) file sharing.

UIS takes the following measures to comply with the requirements:

User Account Lifecycle for NetIDs

Students and employees receive both a campus user account (NetID) and a corresponding UI Enterprise Account (NetID). User’s NetID allows access to campus services such as email, learning management system, and cloud services. It also allows access to Enterprise services such as Self-Service for student and employees, academic history, financial services like W2s, and many other services.