Accounts, Access and Information Security

Includes: Duo, Federated Authorization, Accounts, Digital Certificates...

Categories (10)

Accounts

IDENTITY AND ACCESS MANAGEMENT

Digital Certificates

IDENTITY AND ACCESS MANAGEMENT

Duo Multifactor Authentication

IDENTITY AND ACCESS MANAGEMENT

Federated Authorization

IDENTITY AND ACCESS MANAGEMENT

Pitt Passport Single Sign-On

IDENTITY AND ACCESS MANAGEMENT

Security Awareness and Training (KnowBe4)

SECURITY CONSULTING AND EDUCATION

Security Consultation and Risk Assessments

SECURITY CONSULTING AND EDUCATION

Security Vulnerability Assessment

SECURITY CONSULTING AND EDUCATION

Threat Protection

SECURE COMPUTING

Articles (12)

Accessing SecureU Software for Faculty / Staff / Depts.

Information about software available on the SecureU Sharepoint site.

Best Practices for Avoiding Identity Theft

Identity theft has become one of the fastest-growing crimes in America today. Identity theft is the deliberate assumption of another individual's identity, usually to gain access to a person's finances or to frame that person for a crime.

Best Practices for Safe, Secure, Social Networking

The number of social networking sites is ever growing. Where once our only choice seemed to be Usenet or Friendster (remember those?), we now have a dizzying array from which to choose: Facebook, LinkedIn, Twitter, YouTube, Pinterest, Flickr, Digg, Reddit, Instagram... the list goes on, and changes almost daily!

Copyright Protection Policy and Illegal File Sharing

It is the policy of the University of Pittsburgh to respect the copyright protections given to authors, owners, and publishers under federal law, including the Digital Millennium Copyright Act (“DMCA”). It is against University policy for any student, faculty, or staff member to copy, reproduce, or distribute any software, music, games, or movies, or any other copyrighted work, on University computing equipment except as expressly permitted by a license agreement or with the written consent.

Disposing of Computers and Computer Accessories

Units that are planning to recycle and throw away computer equipment and media are required to do so in a manner that securely removes sensitive information.

Mobile Device Security Guidelines and Best Practices

With more University business being done on mobile devices and smartphones, faculty and staff need to make sure that they are doing their best to secure their devices and protect the University’s interests. Please read over the following guidelines to make sure that your smartphones and tablets are properly secured, regardless of whether they are University-owned or personal.

Password Best Practices and Standards

Password best practices and standards. Includes FAQ and how-to instructions at the end.

Technology Guidelines and Tips for International Travel

International travel has many benefits, but it also entails some degree of risk, especially with regard to the security of technology resources like laptops, smartphones, and mobile devices.

This page provides a number of important technology guidelines and tips for international travel. These guidelines are designed to help you protect your devices and data while traveling, and they will also help to protect University of Pittsburgh systems and data.

Understanding Acceptable Computing Access and Use Policies

University policy establishes restrictions regarding the access and use of University technology resources such as computers, computer systems, networks, services, storage, and email. Students, faculty, and staff are obligated to protect University computing systems from illegal or damaging actions, either knowingly or unknowingly.

Understanding and Using Secure Shell (SSH) and Secure File Transfer Protocol (SFTP)

When remotely connecting to another computer or transferring files between computers,you must use encryption. Encryption will protect usernames, passwords, and other sensitive information. This requires the use of secure protocols.

Understanding Social Security Number (SSN) Policies

SSNs may only be requested when clearly justified, such as when required by law or for business purposes with certain third party providers. The collection of SSNs must be accompanied by an appropriate disclosure of its use. Online and offline computer systems that maintain SSN data must have adequate security as certified by Pitt IT to protect its confidentiality and integrity.

Understanding Workstation Security Standards for Remote Work

All workstations used for remote work must adhere to the University’s security standards below. Only University-managed devices may be used to transmit, process, or store Restricted Data.