Learn about our IT security policies, data integrity and compliance, report viruses, malware or email phishing.
UTHSC will only sanction the storage of FERPA-protected information, Protected Health Information (PHI), or other materials and information covered by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) in the Microsoft 365 environment if the account(s) storing and accessing the information are enabled with two-factor authentication (DUO).
Aligning with the UTHSC mission and goals, researchers conduct various types of research. The data is often collected from human subjects and requires strict levels of protection
As technology continues to advance, it is essential for our community to stay aligned with emerging tools and technologies while simultaneously ensuring responsible and ethical practices. UTHSC’s Office of Cybersecurity and ITS have created a new guidance practice on the acceptable use of generative artificial intelligence (AI).
A Compromised Computer is defined as any computing resource whose confidentiality, integrity, or availability has been adversely impacted, either intentionally or unintentionally, by an untrusted source. A compromise can occur either through manual interaction by the untrusted source or through automation.
Data sanitization is the process of irreversibly removing or destroying data stored on a memory device (hard drives, flash memory / SSDs, mobile devices, CDs, DVDs, etc.) or in hard copy form. It is important to use the proper technique to ensure that all data is purged.
How do I encrypt an email? Encryption ensures that protected or sensitive information is not intercepted during email transmission, thus protecting you and the university from potentially costly and reputation-damaging data breaches.
Learn how to be prepared to respond if your think your device is hacked.
ITS established a webpage explaining the information security requirements needed based on the data's classification level.
If you would like to suppress your information for safety reasons, you can add a privacy flag to your account.
Know what suspicious security threats to report and to whom.
These best practices about security and protecting devices will help protect the data on them.
ITS provides guidance and instructions on how to safely and securely store and share university data and documents. Learn more!
The UT Vault (also known as UT Secure Courier) is a secure file transfer application that allows users to easily send large files, including executables, to those with NetIDs and those outside the UT system quickly, and securely.
Lean how a VPN works and the security behind it.
Please report any suspicious computer/device issues to the ITS Service Desk at 901.448.2222.
Learn why encrypting emails with confidential or classified information is so important!