Skip to Content

University Technology Services


Information Technology Security

UTS helps the university appropriately protect the confidentiality, integrity and availability of computing and information assets. We endeavor to achieve our mission by providing leadership to the university community in the following areas:

  • information security awareness
  • education and consulting
  • information security assessments
  • information technology incident response

We want to help the university be recognized as a responsible, credible and trustworthy steward of the valuable information and computing assets our citizens, colleagues, students and partners entrust with us.

Security Quick Links 

Information Security Program, Overview (3:41) 

This video will introduce you to the Information Security Program. What is it? How does it affect you?

Information Security Program, What all Employees should know (4:32)

This video highlights some of the basics that every employee should know about the Information Security Program.

Information Security Program, What all IT Staff should know (2:41)

This video highlights some of the basics that every IT Staff member should know about the Information Security Program.

Information Security Program, What all Managers should know (2:00)

This video highlights some of the basics that every Executive or Manager should know about the Information Security Program.

Sensitive Data Discovery Procedure

This document establishes a process for locating sensitive information and data systems and media.

Locating Sensitive Data

This video demonstrates how to locate sensitive information and data systems and media, using the Cornell Spider.

Phishing Scams

This is a flyer that outlines some quick tips on how to not get "hooked" by phishing scams.

The Dark Side of Email: How Email Works (2:31)

In its most commonly used form, email should be treated as an insecure communications medium.  To better understand the risks inherent with email use, a basic understanding of how email typically works is necessary.   

The Dark Side of Email: Phishing (5:00)

This video will clearly demonstrate how to spot a particular type of scam email, known as phishing, so you will not be a victim.