Technology is the infrastructure of society. Whether it's writing better code or designing a more secure network, the need to safeguard our valuable information technology resources has never been higher.

Site Pages

Tools utilized by the ERM Program at IU
ERM at Indiana University
Today's smart phones aren't just fancy phones -- they're small, complex computers that must be secured appropriately.
Samples, checklists, and templates for documenting IT compliance, provided by UITS IT Professional Services & Support.
The U.S. Customs and Border Protection (CBP)can inspect, and confiscate, electronic devices such as laptops, cell phones, PDAs, and storage devices.
This material is meant as a guide for department administrators and technicians working to minimize the chance of an IT security breach on Indiana University computer systems, telecommunications, or other information technology systems.
It's important to know what options are available to get your file from point A to point B and to understand whether the method you choose provides adequate security given the sensitivity of the data being transferred.
Security and Privacy Principles are intended to provide high-level guidance for Indiana University's Security and Privacy Program.
An Information Security Program is a "methodical, programmatic approach to implementing and managing security within an organization. is your source for everything security-related at Indiana University.

Recent Security Bulletins

  • RCE vulnerability in OpenFont support for all versions of Windows
  • Notice of a zero-day vulnerability in Oracle's Java has been made public
  • Multiple Zero-Day Flash vulnerabilities.
  • A critical vulnerability in Microsoft's HTTP.sys component may lead to remote code execution.
    • Read the PSIA Blog
    • IU Notify
    • Crime Prevention Tips from IUPD
    • Request Assistance from Environmental Health and Safety
    • Secure Your Computer