Technology is the infrastructure of society. Whether it's writing better code or designing a more secure network, the need to safeguard our valuable information technology resources has never been higher.

Site Pages

Tools utilized by the ERM Program at IU
ERM at Indiana University
Today's smart phones aren't just fancy phones -- they're small, complex computers that must be secured appropriately.
Samples, checklists, and templates for documenting IT compliance, provided by UITS IT Professional Services & Support.
The U.S. Customs and Border Protection (CBP)can inspect, and confiscate, electronic devices such as laptops, cell phones, PDAs, and storage devices.
This material is meant as a guide for department administrators and technicians working to minimize the chance of an IT security breach on Indiana University computer systems, telecommunications, or other information technology systems.
It's important to know what options are available to get your file from point A to point B and to understand whether the method you choose provides adequate security given the sensitivity of the data being transferred.
Security and Privacy Principles are intended to provide high-level guidance for Indiana University's Security and Privacy Program.
An Information Security Program is a "methodical, programmatic approach to implementing and managing security within an organization.
Protect.iu.edu is your source for everything security-related at Indiana University.

Recent Security Bulletins

  • Vulnerability in OpenSSL versions 1.0.1 before 1.0.1g
  • New ransomware named CryptoLocker threatens to destroy data unless a payment is made.
  • Critical Java Vulnerability included in Exploit Kit
  • This bulletin details four recently published, critical rated, vulnerabillies in Adobe ColdFusion and ways to mitigate the risk of them being exploited including the hotfix for supported versions.
    • Read the PSIA Blog
    • IU Notify
    • Crime Prevention Tips from IUPD
    • Request Assistance from Environmental Health and Safety
    • Secure Your Computer