Many Architecture staff and faculty have access to highly restricted data in order to perform their occupational responsibilities. Understanding what the University identifies as secured data is only part of the employee's shared responsibility of protecting restricted data in all its forms.
To learn more about identifying different type of university data please visit the confidential and/or enterprise data page.
To learn more what is allowed to be placed on the different cloud platforms, view the Cloud Storage Usage Policy (PDF).
E-mail Phishing has becoming more and more sophisticated and often leads to a ransomware attacks. In ransomware attacks, often when an email attachment with a malicious code is opened. The encryption blocks the owner of files from accessing them. The hackers then demand money to provide a key to unlock the files. The below training helps identify and prevent such attacks.
...
- Employees must take reasonable steps to protect University data.
- University restricted data should be accessed only if authorized to do so.
- Follow all University regulations, laws and safe computing guidelines.
...