Data Security & Records

Anti-virus, multi-factor authentication, whole disk encryption, firewall, SSL certificates, data security issues, and Records Center storage.

Categories (4)

Records Center

Articles to assist in the processing and handling of university records.

Certificates

Articles to assist in requests and appropriate use of public key certificates.

Articles (69)

Pinned Article Approved Storage Locations

Storage locations approved by OIT for storage of university data, consistent with U of I policies and standards.

Pinned Article Nine Tech Security and Compliance Things You Need to Know

A listing of technology security and compliance best practices.

Pinned Article Third-Party Breaches Related to MOVEit Software

Third party breach information due to MoveIT software zero day affects current and former U of I affiliates.

1Password FAQ

Password manager FAQ

1Password Onboarding

1Password onboarding information.

Ban of TikTok on University Devices

Under Idaho Law, TikTok has been banned on university devices and networks. These messages or errors may be seen by users trying to access TikTok.

Cyber Safety Tips

Follow these tips to help keep your data, accounts, and the university secure!

Guidelines for Compliant Access to High Risk Data

This guide describes the current settings enforced for High Risk data access on macOS, Windows, iOS, and Android.

How do I change my Bitlocker PIN?

This article explains how to change your BitLocker PIN.

How do I erase my hard-disk drive?

Instructions on erasing hard disk drives.

How do I erase my iOS device?

Instructions for erasing an iOS device.

How do I erase my solid-state drive?

Instructions on erasing solid-state drives.

How do I install Sophos Home?

This tutorial explains how to obtain a license and install Sophos Home.

How do I setup disk encryption on a Mac?

Instructions for user setup of Filevault encryption on macOS.

How do I update Google Chrome?

How to check and see that Chrome has the latest updates.

How to access an account during international travel?

Supplemental Terms of Use for International Travel information

How to erase / wipe my Android device?

Instructions on securely erasing an Android devie

How to identify "High Risk" data?

Information to help you identify different classifications of data, which may require different technical controls.

How to reboot a remote BitLocker protected computer?

Remote reboot instructions for BitLocker users.

How to reset a forgotten BitLocker password?

Reset a forgotten BitLocker password when the device is managed only by Intune.

How to set up disk encryption in Windows?

Instructions for user setup of BitLocker PIN on Windows.

HTTP logging requirements for university data

Guidelines for configuring HTTP logging consistent with IT standards

Identifying and Managing ROT Data

Identifying ROT (Redundant, Obsolete, Trivial) data and tips for managing it

National Public Data Breach: April 2024

NPD 2024 Breach information

Protect yourself from identity fraud: prevention and recovery guide

Resources for victims of identity theft and assistance to help avoid becoming a victim.

Protecting Yourself from Fraud: Common Scams

Frauds and scams have become sophisticated, costing Americans billions of dollars annually. Understanding the most prevalent schemes and learning how to protect yourself is essential for financial and personal security

Safe Online Shopping

Remain vigilant this holiday season for hackers, scammers, and online thieves trying to steal your personal and financial information while you shop. To help keep your information secure, please consider the following.

Spam Email

What to do about spam. Some people and business indiscriminately send large amounts of unsolicited commercial email (UCE). In recent years, spam content has expanded to include offensive advertising, malicious content and computer viruses.

System Use Notification

Guidelines to comply with Logon Banner IT standards for APM 30.11.

Technology and Device Security Essentials

Essential Cyber Security Tips for UI Employees

Tips for Avoiding Romance Scams

Reduce your chances of falling victim to a romance scam.

Travel Tips for Cyber Security

Cyber Security Tips for traveling abroad

Vendor/Application Security Assessment Process

This article explains the process used when identifying the risks associated with a particular product or service for the intended use.

What do I do when I forget my encryption passphrase on OSX?

In the case that a user forgets the Power-On-Authentication passphrase that they set when encryption was enabled, this tutorial will demonstrate how a recovery key can be generated so that they can boot their OS X Apple computer and reset their passphrase.

What is phishing?

Information about and helpful tips on identifying phishing emails.

What is WDE (Whole Disk Encryption)?

This article contains information about Whole Disk Encryption at U of I.

Why do I have to format and re-image my computer after it is infected with a virus?

Malware removal is not an effective way to ensure an infected computer is clean. The best way to approach malware infections is to format and re-image the computer.

Why is it important to secure my account and computer?

This article explains the why and how for implementing different security measures for your account and computer.

Guidelines for Temporary Employees and High Risk Data

Mitigations for use of temporary employees handling high risk data.