Learn about our IT security policies, data integrity and compliance, report viruses, malware or email phishing.
UTHSC will only sanction the storage of FERPA-protected information, Protected Health Information (PHI), or other materials and information covered by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) in the Microsoft 365 environment if the account(s) storing and accessing the information are enabled with two-factor authentication (DUO).
Aligning with the UTHSC mission and goals, researchers conduct various types of research. The data is often collected from human subjects and requires strict levels of protection
A Compromised Computer is defined as any computing resource whose confidentiality, integrity, or availability has been adversely impacted, either intentionally or unintentionally, by an untrusted source. A compromise can occur either through manual interaction by the untrusted source or through automation.
Data sanitization is the process of irreversibly removing or destroying data stored on a memory device (hard drives, flash memory / SSDs, mobile devices, CDs, DVDs, etc.) or in hard copy form. It is important to use the proper technique to ensure that all data is purged.
Learn how to be prepared to respond if your think your device is hacked.
ITS established a webpage explaining the information security requirements needed based on the data's classification level.
How do I encrypt an email? Encryption ensures that protected or sensitive information is not intercepted during email transmission, thus protecting you and the university from potentially costly and reputation-damaging data breaches.
Learn why encrypting emails with confidential or classified information is so important!
If you would like to suppress your information for safety reasons, you can add a privacy flag to your account.
Know what suspicious security threats to report and to whom.
These best practices about security and protecting devices will help protect the data on them.
The UT Vault (also known as UT Secure Courier) is a secure file transfer application that allows users to easily send large files, including executables, quickly, and securely.
ITS provides guidance and instructions on how to safely and securely store and share university data and documents. Learn more!
Lean how a VPN works and the security behind it.
Please report any suspicious computer/device issues to the ITS Service Desk at 901.448.2222.