Cybersecurity and Safe Computing

• Learn how to report malware or phishing emails, or review IT security policies.
• e.g. Phishing, Antivirus/Anti-malware, Emergency Alerts, Institutional Data Policy, Safe Computing Training

Services (3)

Data Classification Assessment

An assessment to aid people in data classification.

Security Exceptions and Exemptions to ITS Security Controls

This form is used to request an exception or exemption to established UTHSC Information Technology and Office of Cybersecurity Policies and Standards

UTHSC Information Access during International Travel

A form for staff to request a secure loaner laptop for international travel.