September 3, 2013 at 2:56 PM
Tools utilized by the ERM Program at IU
April 2, 2015 at 9:40 AM
ERM at Indiana University
October 3, 2012 at 10:23 AM
Today's smart phones aren't just fancy phones -- they're small, complex computers that must be secured appropriately.
November 11, 2014 at 1:03 PM
Samples, checklists, and templates for documenting IT compliance, provided by UITS IT Professional Services & Support.
October 11, 2011 at 4:09 PM
The U.S. Customs and Border Protection (CBP)can inspect, and confiscate, electronic devices such as laptops, cell phones, PDAs, and storage devices.
March 13, 2013 at 2:55 PM
This material is meant as a guide for department administrators and technicians working to minimize the chance of an IT security breach on Indiana University computer systems, telecommunications, or other information technology systems.
April 12, 2011 at 7:56 PM
It's important to know what options are available to get your file from point A to point B and to understand whether the method you choose provides adequate security given the sensitivity of the data being transferred.
August 5, 2011 at 4:33 PM
Security and Privacy Principles are intended to provide high-level guidance for Indiana University's Security and Privacy Program.
October 26, 2012 at 9:54 AM
An Information Security Program is a "methodical, programmatic approach to implementing and managing security within an organization.
February 22, 2011 at 10:41 AM
Protect.iu.edu is your source for everything security-related at Indiana University.