Search20 Results

Services or Offerings?
ECU-managed computers only. If you suspect your work computer is infected with a virus or other malware, submit this form for help.

DatAdvantage tracks permissions and data changes on department Piratedrive folders and emails a report to owners.

Request encryption be enabled for ECU-purchased computers, tablets, thin clients, USB hard drives and flash drives.

Supervisors submit this request BEFORE an employee's separation date to remove access to IT systems.

Submit this request to the Office of the Registrar for approval to host (store) FERPA data.

ECU blocks all file-sharing traffic on the university’s network. Submit this request for an exception to use software such as BitTorrent, uTorrent, or Vuze for a legitimate business or academic purpose.

Submit this request for assistance with developing security content for your area.

Submit this form to request guidance on your department's business processes to ensure the security of your department's information.

Submit this request for assistance with the identification, assessment and management of risks to University information.

The Information Security Office maintains information security standards for ECU which define the responsibilities of all employees for protecting university information.

Microsoft Intune helps users balance data access with data security on a mobile device.

MFA is a security action to verify your identity during log in to ECU resources.

Rapid7 InsightVM is a vulnerability management service that autonomously scans servers, network devices and other applicable systems to assess the vulnerability/exposure landscape as well as ensure these systems are in compliance with campus policies.

Submit this request for approval to collect, store, use or disclose Social Security Numbers or other Personally Identifiable Information (PII) subject to the North Carolina State Privacy and/or Identity Theft Protection Act(s).

The purpose of the Technology Threshold Assessment (TTA) is to aid ITCS in evaluating the information/data in the system and make the appropriate determination about how to treat the information/data, as required by University, State, and Federal regulations.