Cybersecurity and Safe Computing

Learn about our IT security policies, data integrity and compliance, report viruses, malware or email phishing.

Categories (1)

Duo

Everything you need to know about Duo including first time usage, restoring, and troubleshooting

Articles (5)

Pinned Article OneDrive and SharePoint: Storing Sensitive/Protected Data

UT Health Science Center will only sanction the storage of FERPA-protected information, Protected Health Information (PHI), or other materials and information covered by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) in the Microsoft 365 environment if the account(s) storing and accessing the information are enabled with two-factor authentication (DUO).

Pinned Article Security Requirements for Researchers

Aligning with the UT Health Science Center mission and goals, researchers conduct various types of research. The data is often collected from human subjects and requires strict levels of protection

Acceptable Use of Generative AI

As technology continues to advance, it is essential for our community to stay aligned with emerging tools and technologies while simultaneously ensuring responsible and ethical practices. UTHSC’s Office of Cybersecurity and ITS have created a new guidance practice on the acceptable use of generative artificial intelligence (AI).

What To Report

Please report any suspicious computer/device issues to the ITS Service Desk at 901.448.2222.