Stories Tagged as “privacy”

IU’s mobile device security policy is good advice for everyone

Learn more about IU’s mobile device policy and how to secure your device.

More >>

Box@IU approved for restricted data

IU has four types of data classifications to indicate varying levels of data sensitivity. Until now, your Box account could contain two types of data: Public and “University-internal,” which is a bit more sensitive than public and can only be accessed by certain members of the university to conduct university business.

More >>

Don’t get hooked by the latest phishing scam

Many of you received a fake warning about your email quota. Know how to avoid a fake? Here are a few pointers from the Security Office.

More >>

IU VP for IT Brad Wheeler has announced that Von Welch will succeed Fred H. Cate as director of IU’s Center for Applied Cybersecurity Research (touch for more >>)

Welch has an extensive background in cybersecurity. Before joining IU, he was the founding co-director of the Cybersecurity Directorate at the National Center for Supercomputing Applications, based at the University of Illinois-Urbana Champaign. He currently serves as director and principal investigator for the Center for Trustworthy Scientific Cyberinfrastructure, which provides cybersecurity assistance and guidance to projects funded by the National Science Foundation.

More >>

More IT news and events for July 2, 2014

IU Bioinformatics Clinic; The Media School debuts; Von Welch named new leader of IU’s Center for Applied Cybersecurity Research

More >>

IU computer scientists uncover bot-controlled Twitter accounts

A team of researchers at IU has developed a tool called BotOrNot that helps you determine the true source of tweets.

More >>

More IT news and events for May 21, 2014

IUPUI Campus Center help desk opens; Pluralsight online pilot training program extended; IU South Bend gets new UITS executive director; IU faculty and students bring home seven Sony scholarships; IU informatics team’s award-winning Android app heads to premier tech security event

More >>

See UITS User Survey results

Thanks to all who participated in the 2014 UITS Customer Satisfaction Surveys. Student, faculty, and staff responses to these annual surveys help measure the effectiveness of IU’s IT resources, and serve as important guides to improving IT services and support.

More >>

Introducing the IT News & Events website

Find the latest on everything from IU’s supercomputer, Big Red II, and security bug Heartbleed to high-tech teaching tools and privacy tips.

More >>

More IT news and events for April 23, 2014

Chromebooks can now connect to IU Secure; IU privacy expert offers recommendations on “big data”; IU researcher fighting crime with mobile phone data; IU to host 2014 Technology Exchange; Senior network engineer Brent Sweeny earns President’s Leadership Award from Internet2

More >>

IU reports potential data exposure

IU notified the Indiana attorney general’s office yesterday of the potential exposure of personal data for some students and recent graduates.

More >>

Keeping IU’s digital information safe

IU’s IT-28 policy is designed to reduce vulnerabilities and exposure as much as possible to protect IU’s digital information.

More >>

More IT news and events for January 29, 2014

Check out the “Talk Nerdy to Me” podcast; Report confirms NSA bulk collection is neither effective nor legal; Leaders in data preservation and access to visit IU Bloomington; NSF grant furthers IU artificial intelligence research to improve health care; IU Big Data course named in top 10 massive open online courses (MOOCs) for techies

More >>


Page 1 of 512345

Start visualizing with the CIB IQ-Wall

Imagine the content of your computer screen spread across a 24 x 18 foot wall, tiled with 24 flat screen monitors.

Photo Stream

Roy Tanck's Flickr Widget requires Flash Player 9 or better.

View all UITS photos