Cybersecurity Operations Center – Critical Incident Response
IF YOU DISCOVER A PROBABLE BREACH
Phishing Help
What is Phishing?
Cyber criminals use email in malicious ways to gain access to data. Like a fisherman uses a hook to get a fish, the ultimate goal is to convince you to provide them with information they want. Phishing email often appears legitimate, so users fall for requests to click on links, open attachments, visit websites, or to respond to the sender with personal information.
Workstation Locking
The safety and security of our data is a top priority at UIS. In an effort to better protect your files, ITS implemented a computer security policy that will automatically lock office, classroom, and lab computers after 20 minutes of inactivity. This policy is based on a recommendation from The Office of University Audits.
ITS encourages you to lock your computer anytime you walk away from it, even for just a minute. To do so, press Ctrl+Alt+Del and then choose Lock this computer. Or press the Windows key and ‘L’.
Equipment Transfer and Disposal
Disposals
- Disposal of Electronic Equipment (desktops & laptops only) will be handled by UIS Information Technology Services. Individual departments will need to complete an Interdepartmental Transfer in FABweb to transfer the equipment to UIS Information Technology Services, who will then complete data wiping, internal redistribution, and disposal.
Protection of Electronic Information
Protection of Information in Electronic Media
Information and data maintained in electronic media on University computer systems are protected by the same laws and policies, and are subject to the same limitations, as information and communications in other media. Before storing or sending confidential or personal information, campus users should understand that most materials on University systems are, by definition, public records. As such, they are subject to laws and policies that may compel the University to disclose them.
Plan for Combating the Unauthorized Distribution of Copyrighted Material by Users of UIS Network
The Higher Education Opportunity Act (HEOA) is a reauthorization of the Higher Education Act. It includes provisions that are designed to reduce the illegal uploading and downloading of copyrighted works through peer-to-peer (P2P) file sharing.
UIS takes the following measures to comply with the requirements:
Guidelines for Using the Campus Announcement System
- The Campus Announcement system is automated.
Acceptable Use of Network Resources
Access to the UIS campus network is a privilege granted to employees, students, and guests who agree to comply with the provisions of this policy. Everyone using the campus network is responsible for using it in an appropriate, ethical and lawful manner.
All users must comply with the following:
Guidelines for Using Computer Labs
Information Technology Services maintains the equipment in the classrooms across campus. The classrooms are technology rich with the tools to support students and faculty in the learning environment.
User Account Lifecycle for NetIDs
Students and employees receive both a campus user account (NetID) and a corresponding UI Enterprise Account (NetID). User’s NetID allows access to campus services such as email, learning management system, and cloud services. It also allows access to Enterprise services such as Self-Service for student and employees, academic history, financial services like W2s, and many other services.