Cybersecurity and Safe Computing

• Learn how to report malware or phishing emails, or review IT security policies.
• e.g. Phishing, Antivirus/Anti-malware, Emergency Alerts, Institutional Data Policy, Safe Computing Training

Services (1)

Security Exceptions and Exemptions to ITS Security Controls Request Form

This form is used to request an exception or exemption to established UTHSC Information Technology and Office of Cybersecurity Policies and Standards