Published on Information Security at UVA (https://security.virginia.edu)

Home > Security Guidance > Role-Based Guidance > IT Resource Users

Security for IT Resource Users

Welcome to the IT Resource Users Guidance page. Take a moment to consult the items below.  They will help guide you in understanding the tools you have availability to you as well as your responsibilities a user of UVA IT Resources.

How to Secure Your Computer

  • Requirements for Securing Electronic Devices
  • Get a securely preconfigured computer: DCI program [1]
  • Get Security Software
    • AntiVirus: Use Microsoft Windows Defender [2] for PCs, Gatekeeper [3] for Macs, or Cylance for Linux, Mac, or Windows [4]
    • Encrypt [5] files on your computer
    • Secure remote access and file transfer with SecureCRT [6] 
    • Transfer files to/from servers using SecureFX [7]
    • Delete your data safely and securely by following the Electronic Data Removal Procedures [8] guidelines. You can download the Secure Deletion Shredder for Windows using this link [9]. To securely delete information for Macs and get more information on securely deleting data on your device, follow this link [8]. 
  • Protect your Home Computer and Network [10]

Know Your Rights and Responsibilities

  • Responsible Computing at UVA for faculty and staff [11]: a handbook for UVA faculty and staff to determine what they can, cannot, and must do regarding information technology at the University. 
  • Responsible Computing at UVA for students [12]: a handbook for UVA students to determine what they can, cannot, and must do regarding information technology at the University. 
  • Information Policy [13]: Follow the link to access the full library of information policy. You can also email the Information Security team [14] for additional information or assistance navigating IT policy.
  • Security Responsibilities:
    • Security of Network-Connected Devices [15]: Network-connected devices [16] include all systems, whether personally or University-owned or managed, with the ability to connect to a wired or wireless network. This includes, but is not limited to, computers, laptops, desktops, servers (virtual or physical), smart phones, tablets, digital assistants, printers, copiers, network-aware devices [16] with embedded electronic systems (i.e., “Internet of things”), and supervisory control and data [17] acquisition (SCADA) and industrial control systems. Follow the link to learn more about the requirements for using these devices on a University network. 
    • Reporting an Information Security Incident Standard [18]
    • Highly Sensitive Data Protection Standard for Individual-Use Devices or Media [19]: If you are using or storing highly sensitive data on your device, you must follow the strict regulations required for protecting this data from potential cyber-attacks. Follow the link to learn about these requirements. If you are not familiar with the definition of highly sensitive data, follow this link.  [20]

Do you have a Sec​urity Problem?

  • Report a Security Problem [21]
  • Follow this link to view all Suspicious Emails Currently Circulating at UVa  and all Security Alerts [22].

 


Source URL: https://security.virginia.edu/computerdevice-users

Links
[1] https://www.cavaliercomputers.com/shop_dci.asp?
[2] https://www.microsoft.com/en-us/windows/windows-defender/
[3] https://www.imore.com/how-use-gatekeeper-your-mac
[4] https://virginia.service-now.com/its?id=sg_catalog&sys_id=b9fb6247db59270c2192e6650596190f&sysparm_category=3478d39bdbfcab00cebc550a48961945
[5] https://security.virginia.edu/encryption
[6] http://virginia.service-now.com/its?id=itsweb_kb_article&sys_id=65a00a3cdb11db404f32fb671d9619bb
[7] https://virginia.service-now.com/its?id=itsweb_kb_article&sys_id=d1450ab4db51db404f32fb671d9619c5
[8] https://security.virginia.edu/electronic-data-removal-procedures#Secure%20Deletion
[9] https://virginia.service-now.com/its?id=sg_catalog&sys_id=d4b2620cdba5234c2192e665059619e2&sysparm_category=3478d39bdbfcab00cebc550a48961945
[10] https://staysafeonline.org/stay-safe-online/securing-key-accounts-devices/securing-home-network/
[11] https://security.virginia.edu/responsible-computing-faculty-staff
[12] https://security.virginia.edu/responsible-computing-students
[13] https://security.virginia.edu/information-policy
[14] https://security.virginia.edu/it-security%40virginia.edu
[15] https://security.virginia.edu/security-network-connected-devices-standard
[16] https://security.virginia.edu/ajax/npop/node/1141/load/nojs
[17] https://security.virginia.edu/ajax/npop/node/1006/load/nojs
[18] https://security.virginia.edu/reporting-information-security-incident-standard
[19] https://security.virginia.edu/highly-sensitive-data-protection-standard-individual-use-electronic-devices-or-media
[20] https://security.virginia.edu/ajax/npop/node/4581/load/nojs
[21] https://security.virginia.edu/report-information-security-incident
[22] https://security.virginia.edu/security-alerts-and-warnings