Security Guidance

Security guidance, as well as standards and procedures, are essential for protecting the UVA community in a changing cybersecurity threat landscape. We suggest you review this information carefully to learn how to protect vital assets, data, and identities. Be sure to return often to review updates, as technology changes rapidly.

Best Practices

Information technology best practices are proven techniques, methods, and processes honed through experience and testing. Follow the best practices outlined on this page to protect assets, data, and identities.


Resources to assist in navigating compliance information that is relevant to you and help guide you toward compliance in your role within the UVA community.

IT Abuse

As used in reference to computer, network, and Internet security, the term "abuse" describes willful or negligent unauthorized activity that affects the availability, confidentiality, or integrity of information technology (IT) resources.

Role-Based Guidance

The items listed on this page provide guidance related to your role at UVA, as well as links to useful resources and software specific to your affiliation and position.

Security Tools

Learn how to use the security tools highlighted on this page to help secure your devices and data.

Source URL: