Search54 Results

Information on Duo Verified Push and Risk Based authentication
Mitigations for use of temporary employees handling high risk data.
This guide describes the current settings enforced for High Risk data access on macOS, Windows, iOS, and Android.
Information to help you identify different classifications of data, which may require different technical controls.
This article explains the process used when identifying the risks associated with a particular product or service for the intended use.
Project management is a set of principles, methods, tools, and techniques for the effective management of objective-oriented work (projects). The methodology provides repeatable processes and is used in the context of a specific and unique organizational environment. Project management is the method used to bring a project to a successful conclusion.
Answers to frequently asked questions about Whole Disk Encryption.
Frequently asked questions regarding processes for IT project creation, submission, governance, and prioritization.
FAQ Page for Change Enablement.
The following locations have been approved by OIT for storage of university data, consistent with U of I policies and standards.
Step-by-step instructions on how to create a project in Team Dynamix
Steps to submit and resolve a Request for Change (RFC)