IT Security - Compliance

Information and equipment security, sensitive data, compliance and governance as well as regulations, guidelines and terms & conditions

Categories (6)

Web standards, terms and conditions, cloud computing, sensitive data

Information related to security measures for ECU-managed desktop and laptop computers and other equipment.

Report a security concern, make your passphrase more secure and catch up on vishing, phishing and information security best practices.

Federal and state statutes guide many ECU processes.

ECU users are responsible for the protection of any sensitive data in their custody. See these guides on protecting sensitive data.

Identity Theft Protection Committee (ITPC) and other IT governance, decision-making committees.

Articles (1)

ITCS Technology Requirements and Guidelines

A comprehensive list of information technology guidelines, policies and requirements.