Difference between revisions of "JHU IT Security"
Line 3: | Line 3: | ||
==JHU IT's Website== | ==JHU IT's Website== | ||
− | You can reach JHU IT by visiting: [https://it.johnshopkins.edu https://it.johnshopkins.edu] | + | : You can reach JHU IT by visiting: [https://it.johnshopkins.edu https://it.johnshopkins.edu] |
==JHU IT Security Policies== | ==JHU IT Security Policies== | ||
− | JHU has established various policies to ensure acceptable use and security of computing resources within the University. Please visit [https://it.johnshopkins.edu/policies https://it.johnshopkins.edu/policies] for a complete list of these policies. However, we will highlight a few that you should be familiar with. | + | :JHU has established various policies to ensure acceptable use and security of computing resources within the University. Please visit [https://it.johnshopkins.edu/policies https://it.johnshopkins.edu/policies] for a complete list of these policies. However, we will highlight a few that you should be familiar with. |
===General JHU IT Use and Security Policies=== | ===General JHU IT Use and Security Policies=== | ||
− | [https://policies.jhu.edu/?event=render&mid=796&pid=32378&fid=policy_32378.pdf&_=0.785408630212 Acceptable Use and Securityof Johns Hopkins | + | : Please visit: [https://policies.jhu.edu/?event=render&mid=796&pid=32378&fid=policy_32378.pdf&_=0.785408630212 Acceptable Use and Securityof Johns Hopkins Information Technology Resources] |
===Protecting Sensitive Information=== | ===Protecting Sensitive Information=== | ||
− | Personally Identifiable Information (PII) includes birthdates, social security numbers, financial information, plus more. | + | :Personally Identifiable Information (PII) includes birthdates, social security numbers, financial information, plus more. |
− | JHU has its own | + | :JHU has its own policies regarding protecting, storing, and transferring PII. Please visit: https://policies.jhu.edu/?event=render&mid=769&pid=32368&fid=PII_Policy.pdf&_=0.928234992742 JHU's Personally Identifiable Information Policy] |
==JHU-Provided IT Security Online Courses== | ==JHU-Provided IT Security Online Courses== | ||
− | [https://lms14.learnshare.com/dashboard/dash.home.aspx?Z=Cvz7rlERBiINCk3kFkMDWtWkTAGCTs%2fZPxff8PHH9jpE3NtAwUrdMyfZVOCTBf2m Course: JHU Electronic Information Security and Data Management] A short online course discussing protecting/storing/transferring Personally Identifiable Information (PII), reporting related IT security issues, protecting yourself from email Phishing, and JHU IT Security policies. Well worth the 30 minutes allotted. | + | :[https://lms14.learnshare.com/dashboard/dash.home.aspx?Z=Cvz7rlERBiINCk3kFkMDWtWkTAGCTs%2fZPxff8PHH9jpE3NtAwUrdMyfZVOCTBf2m Course: JHU Electronic Information Security and Data Management] A short online course discussing protecting/storing/transferring Personally Identifiable Information (PII), reporting related IT security issues, protecting yourself from email Phishing, and JHU IT Security policies. Well worth the 30 minutes allotted. |
[[Category:Security] | [[Category:Security] |
Revision as of 20:49, 4 December 2020
JHU has an IT group that oversees computer security for the university. This page provides links to important resources relevant for maintaining a safe computing environment at JHU.
JHU IT's Website
- You can reach JHU IT by visiting: https://it.johnshopkins.edu
JHU IT Security Policies
- JHU has established various policies to ensure acceptable use and security of computing resources within the University. Please visit https://it.johnshopkins.edu/policies for a complete list of these policies. However, we will highlight a few that you should be familiar with.
General JHU IT Use and Security Policies
Protecting Sensitive Information
- Personally Identifiable Information (PII) includes birthdates, social security numbers, financial information, plus more.
- JHU has its own policies regarding protecting, storing, and transferring PII. Please visit: https://policies.jhu.edu/?event=render&mid=769&pid=32368&fid=PII_Policy.pdf&_=0.928234992742 JHU's Personally Identifiable Information Policy]
JHU-Provided IT Security Online Courses
- Course: JHU Electronic Information Security and Data Management A short online course discussing protecting/storing/transferring Personally Identifiable Information (PII), reporting related IT security issues, protecting yourself from email Phishing, and JHU IT Security policies. Well worth the 30 minutes allotted.
[[Category:Security]