Check out other tips to be cyber secure from the State of Kansas campaign – Kansans Being Cyber Secure Strong!
Information is an important asset that needs to be protected from unauthorized modification, destruction, or disclosure. Our university prides itself on the free exchange of knowledge and ideas, which means some information created or maintained by at ESU can and should be shared with the public. To these ends, the following policies have been developed and put into place. Please send your information security questions via e-mail to firstname.lastname@example.org. Link here for University Security Policies.
Regulations, laws, privacy rights and a sense of due diligence all play important roles in information policy development. Information security covers physical security (locking information and servers away), awareness of risks and threats, and electronic security such as anti-virus programs and encryption of files.
Phishing scams are becoming increasingly sophisticated and harder to detect. Protect yourself! Read more about phishing and what you need to do to protect your private information. View this tutorial to learn more.
Emporia State University’s security policies are in place not only to help protect ESU’s information, but to set standards on acceptable computing using ESU’s Internet access. ESU’s Digital Millennium Copyright Act (DMCA) policy states:
“..users of Internet services and equipment and equipment provided by ESU are responsible for their compliance with all copyright laws pertaining to information they place on or retrieve from the Internet.” Continue reading.
An Information Security (IS) incident is something that has happened to compromise the information of students, faculty, and/or staff, as well as ESU business information. An IS incident could be:
When IS incidents happen, serious threats and consequences can occur. ESU faculty and staff are responsible for reporting suspected or known security incidents, including any observed or suspected security weaknesses in ESU systems or services. (Read the IS Incident Reporting procedures.) You may also access this information at Techsite; look in the Employee section under Information Security Procedures.