Skip to main content

Information Technology Security Office

Introduction

The University continually develops, maintains and improves its information technology (IT) infrastructure and applications to support the creation, storage, modification and sharing of data. These IT systems are essential to the efficient and effective operation of the University. The University, therefore, has a responsibility to institute appropriate safeguards to keep its IT systems and information assets secure. In addition, the University must comply with various regulatory requirements that are also designed to keep certain types of data secure and confidential.

The security of IT systems and information assets is dependent on the individuals managing as well as the individuals utilizing such resources. The University is committed to supporting the principles of academic freedom and the free exchange of ideas and the University's information security policies and programs are intended to support those principles while still maintaining an appropriate level of security.

The goals of this security program are to:

  1. Protect the University's IT systems and information assets from unauthorized access, alteration, disclosure or destruction.
  2. Ensure the reliability and availability of the University's IT systems and information assets.
  3. Ensure the privacy of faculty, staff and student information and that of other University customers or associates.
  4. Protect the reputation of the University and ensure compliance with federal and state laws and regulations.
  5. Establish resources and guidelines that allow all individuals within the University community to practice good data stewardship.

IT Security News

Reviewed 2023-08-16