Read UITS News for January 28, 2015
Stories Tagged as “privacy”
Learn more about IU’s mobile device policy and how to secure your device.
IU has four types of data classifications to indicate varying levels of data sensitivity. Until now, your Box account could contain two types of data: Public and “University-internal,” which is a bit more sensitive than public and can only be accessed by certain members of the university to conduct university business.
Many of you received a fake warning about your email quota. Know how to avoid a fake? Here are a few pointers from the Security Office.
IU VP for IT Brad Wheeler has announced that Von Welch will succeed Fred H. Cate as director of IU’s Center for Applied Cybersecurity Research (touch for more >>)
Welch has an extensive background in cybersecurity. Before joining IU, he was the founding co-director of the Cybersecurity Directorate at the National Center for Supercomputing Applications, based at the University of Illinois-Urbana Champaign. He currently serves as director and principal investigator for the Center for Trustworthy Scientific Cyberinfrastructure, which provides cybersecurity assistance and guidance to projects funded by the National Science Foundation.
IU Bioinformatics Clinic; The Media School debuts; Von Welch named new leader of IU’s Center for Applied Cybersecurity Research
A team of researchers at IU has developed a tool called BotOrNot that helps you determine the true source of tweets.
IUPUI Campus Center help desk opens; Pluralsight online pilot training program extended; IU South Bend gets new UITS executive director; IU faculty and students bring home seven Sony scholarships; IU informatics team’s award-winning Android app heads to premier tech security event
Thanks to all who participated in the 2014 UITS Customer Satisfaction Surveys. Student, faculty, and staff responses to these annual surveys help measure the effectiveness of IU’s IT resources, and serve as important guides to improving IT services and support.
Find the latest on everything from IU’s supercomputer, Big Red II, and security bug Heartbleed to high-tech teaching tools and privacy tips.
Chromebooks can now connect to IU Secure; IU privacy expert offers recommendations on “big data”; IU researcher fighting crime with mobile phone data; IU to host 2014 Technology Exchange; Senior network engineer Brent Sweeny earns President’s Leadership Award from Internet2
IU notified the Indiana attorney general’s office yesterday of the potential exposure of personal data for some students and recent graduates.
IU’s IT-28 policy is designed to reduce vulnerabilities and exposure as much as possible to protect IU’s digital information.