Search54 Results
- Knowledge Base
- Data Security & Records
- Multifactor Authentication
Information on Duo Verified Push and Risk Based authentication
- Knowledge Base
- Data Security & Records
Mitigations for use of temporary employees handling high risk data.
- Knowledge Base
- Data Security & Records
This guide describes the current settings enforced for High Risk data access on macOS, Windows, iOS, and Android.
- Knowledge Base
- Data Security & Records
Information to help you identify different classifications of data, which may require different technical controls.
- Knowledge Base
- Email, Messaging & Web
- Knowledge Base
- Data Security & Records
This article explains the process used when identifying the risks associated with a particular product or service for the intended use.
- Knowledge Base
- Consulting, Training, & Projects
Project management is a set of principles, methods, tools, and techniques for the effective management of objective-oriented work (projects). The methodology provides repeatable processes and is used in the context of a specific and unique organizational environment. Project management is the method used to bring a project to a successful conclusion.
- Knowledge Base
- Data Security & Records
Answers to frequently asked questions about Whole Disk Encryption.
- Knowledge Base
- Consulting, Training, & Projects
Frequently asked questions regarding processes for IT project creation, submission, governance, and prioritization.
- Knowledge Base
- Change Enablement
FAQ Page for Change Enablement.
- Knowledge Base
- Data Security & Records
- Knowledge Base
- Data Security & Records
The following locations have been approved by OIT for storage of university data, consistent with U of I policies and standards.
- Knowledge Base
- Consulting, Training, & Projects
Step-by-step instructions on how to create a project in Team Dynamix
- Knowledge Base
- Change Enablement
Steps to submit and resolve a Request for Change (RFC)
- Knowledge Base
- Data Security & Records