Difference between revisions of "JHU IT Security"

Line 3: Line 3:
 
==JHU IT's Website==
 
==JHU IT's Website==
  
You can reach JHU IT by visiting:  [https://it.johnshopkins.edu https://it.johnshopkins.edu]
+
: You can reach JHU IT by visiting:  [https://it.johnshopkins.edu https://it.johnshopkins.edu]
  
 
==JHU IT Security Policies==
 
==JHU IT Security Policies==
  
JHU has established various policies to ensure acceptable use and security of computing resources within the University. Please visit [https://it.johnshopkins.edu/policies https://it.johnshopkins.edu/policies] for a complete list of these policies.  However, we will highlight a few that you should be familiar with.
+
:JHU has established various policies to ensure acceptable use and security of computing resources within the University. Please visit [https://it.johnshopkins.edu/policies https://it.johnshopkins.edu/policies] for a complete list of these policies.  However, we will highlight a few that you should be familiar with.
  
  
 
===General JHU IT Use and Security Policies===
 
===General JHU IT Use and Security Policies===
  
[https://policies.jhu.edu/?event=render&mid=796&pid=32378&fid=policy_32378.pdf&_=0.785408630212 Acceptable Use and Securityof Johns Hopkins InformationTechnology Resources]
+
: Please visit:  [https://policies.jhu.edu/?event=render&mid=796&pid=32378&fid=policy_32378.pdf&_=0.785408630212 Acceptable Use and Securityof Johns Hopkins Information Technology Resources]
  
 
===Protecting Sensitive Information===
 
===Protecting Sensitive Information===
  
Personally Identifiable Information (PII) includes birthdates, social security numbers, financial information, plus more.  
+
:Personally Identifiable Information (PII) includes birthdates, social security numbers, financial information, plus more.  
  
JHU has its own policy in protecting, storing, and transferring PII.  Please visit:  https://policies.jhu.edu/?event=render&mid=769&pid=32368&fid=PII_Policy.pdf&_=0.928234992742 JHU's Personally Identifiable Information Policy]
+
:JHU has its own policies regarding protecting, storing, and transferring PII.  Please visit:  https://policies.jhu.edu/?event=render&mid=769&pid=32368&fid=PII_Policy.pdf&_=0.928234992742 JHU's Personally Identifiable Information Policy]
  
 
==JHU-Provided IT Security Online Courses==
 
==JHU-Provided IT Security Online Courses==
  
[https://lms14.learnshare.com/dashboard/dash.home.aspx?Z=Cvz7rlERBiINCk3kFkMDWtWkTAGCTs%2fZPxff8PHH9jpE3NtAwUrdMyfZVOCTBf2m  Course: JHU Electronic Information Security and Data Management]  A short online course discussing protecting/storing/transferring Personally Identifiable Information (PII), reporting related IT security issues, protecting yourself from email Phishing, and JHU IT Security policies.  Well worth the 30 minutes allotted.  
+
:[https://lms14.learnshare.com/dashboard/dash.home.aspx?Z=Cvz7rlERBiINCk3kFkMDWtWkTAGCTs%2fZPxff8PHH9jpE3NtAwUrdMyfZVOCTBf2m  Course: JHU Electronic Information Security and Data Management]  A short online course discussing protecting/storing/transferring Personally Identifiable Information (PII), reporting related IT security issues, protecting yourself from email Phishing, and JHU IT Security policies.  Well worth the 30 minutes allotted.  
  
 
[[Category:Security]
 
[[Category:Security]

Revision as of 20:49, 4 December 2020

JHU has an IT group that oversees computer security for the university. This page provides links to important resources relevant for maintaining a safe computing environment at JHU.

JHU IT's Website

You can reach JHU IT by visiting: https://it.johnshopkins.edu

JHU IT Security Policies

JHU has established various policies to ensure acceptable use and security of computing resources within the University. Please visit https://it.johnshopkins.edu/policies for a complete list of these policies. However, we will highlight a few that you should be familiar with.


General JHU IT Use and Security Policies

Please visit: Acceptable Use and Securityof Johns Hopkins Information Technology Resources

Protecting Sensitive Information

Personally Identifiable Information (PII) includes birthdates, social security numbers, financial information, plus more.
JHU has its own policies regarding protecting, storing, and transferring PII. Please visit: https://policies.jhu.edu/?event=render&mid=769&pid=32368&fid=PII_Policy.pdf&_=0.928234992742 JHU's Personally Identifiable Information Policy]

JHU-Provided IT Security Online Courses

Course: JHU Electronic Information Security and Data Management A short online course discussing protecting/storing/transferring Personally Identifiable Information (PII), reporting related IT security issues, protecting yourself from email Phishing, and JHU IT Security policies. Well worth the 30 minutes allotted.

[[Category:Security]