University of Pittsburgh students, faculty, and staff have an international presence. They rely on access to the University’s enterprise IT services, no matter where they may be studying, teaching, or working. However, the unique regulatory and political environment in China can create challenges for members of the University community attempting to access Pitt services.
Every day you receive email messages with attached documents, photos, or other electronic files.
Sometimes these attachments contain destructive viruses, Trojan horses, or spyware, sent intentionally by someone who intends to cause harm or steal sensitive personal information.
Laptops and other portable devices (such as tablets, smartphones, USB drives, CDs, floppy disks, etc.) are frequently stolen or lost. Remember that you should eliminate any unauthorized sensitive information from portable devices and encrypt all authorized sensitive information.
Identifiers That Must Be Removed to Make Health Information De-Identified
Learn how to spot and report phishing emails.
Sensitive documents and computer files can be vulnerable to a theft or accidental exposure if not kept physically secured.
The Pitt IT Security team develops and offers training and instructional programming with the latest practices and tools to help University departments increase IT security awareness.
Portable devices include laptop computers, tablets, smartphones, personal digital assistants, USB (flash) drives, and CDs. These devices are frequently stolen or lost. Remember that you should eliminate any unauthorized sensitive information from portable devices and encrypt all authorized sensitive information.
Social networking sites like Facebook and Twitter can be a great way to connect with friends. But there are some social networking safety tips you should always keep in mind.
Scammers often take advantage of health scares to distribute phishing scams. The COVID-19 pandemic continues to spawn dozens of such campaigns, scaring recipients into clicking on harmful links or attachments in emails, text messages or social media posts.
Social engineering is the art of manipulating people into performing actions or divulging confidential information. Social engineering applies to trickery used for information gathering or computer access and in most cases the attacker never comes face-to-face with the victim.
Any information that can be used to identify you or another person is sensitive information. Be advised: Sensitive information is regulated by laws and University policies and should never be stored on your computer's hard drive, on a portable device, or sent via email without proper authorization. Protecting sensitive information on University computers is the responsibility of all members of the University community.
The steps on this page provide guidance for University-owned devices. For more information about personal devices, answers to frequently asked questions, guidance for IT support staff in departments, and general information about the antivirus transition, please visit our antivirus transition home page.
The Family Educational Rights and Privacy Act (FERPA) of 1974 is also commonly referred to as the "Buckley Amendment." It protects the rights of students by requiring controls for the creation, maintenance, and access to educational records. FERPA guarantees students access to their academic records while prohibiting unauthorized access by others.
The Health Insurance Portability and Accountability Act of 1996 ("HIPAA") was enacted to protect the privacy and security of health-related personal information. HIPAA requires institutions that store, transmit, and manage personal medical information to have control over the confidentiality, integrity and availability of this data.
How to remove Malwarebytes Premium due to end of license agreement.