Governance, Compliance & Security

Information Security Best Practices, Identity Theft Protection Committee (ITPC) FAQs, File Sharing, Passphrase Security Standards, Software Licensing Agreements and Compliance

Categories (1)

Policies, Guidelines, Terms & Conditions

Important Policies, Guidelines, Regulations and Terms & Conditions related to the Web, Software, Systems, and Sensitive Data

Articles (16)

AMP for EndPoints Malware Protection

Cisco AMP for Endpoints is a cloud-based malware protection software that scans your ECU-managed Mac or Windows system for malicious software. AMP for Endpoints works in conjunction with other virus protection tools to protect your computer.

Copyright Compliance

Copyright resources

HIPAA

HIPAA provides patients with more control over their health information, sets boundaries on the use and disclosure of protected health information, establishes safeguards, holds violators accountable, and supports public responsibility of disclosures.

Passphrase Security Standard

ECU's passphrase security standard ensures accounts are protected from unauthorized use.

Phishing Email

This overview explains how to spot phishing, spear phishing and ransomware email and what to do if you become a victim.

Report a Security Concern

It is every user’s responsibility to report all security concerns, whether benign and accidental or malicious and deliberate, so that appropriate resolution is undertaken with the least data loss or compromise.

Software Licensing Agreements and Compliance

If you use an ECU-issued computer, it is your responsibility to inventory installed programs and to maintain proof of purchase for software licenses.

Vishing - Protect Your Information

Vishing, or voice phishing, is a scam that occurs over the phone. Learn how to protect yourself.