Skip to content

Information Technology


Information Security

October is National Cyber Security Awareness Month!

Check out other tips to be cyber secure from the State of Kansas campaign – Kansans Being Cyber Secure Strong!

Why Information Security?

Information is an important asset that needs to be protected from unauthorized modification, destruction, or disclosure. Our university prides itself on the free exchange of knowledge and ideas, which means some information created or maintained by at ESU can and should be shared with the public. To these ends, the following policies have been developed and put into place. Please send your information security questions via e-mail to iso@emporia.edu. Link here for University Security Policies.

Regulations, laws, privacy rights and a sense of due diligence all play important roles in information policy development. Information security covers physical security (locking information and servers away), awareness of risks and threats, and electronic security such as anti-virus programs and encryption of files.

 

Watch out for PHISH emails!

Phishing scams are becoming increasingly sophisticated and harder to detect. Protect yourself! Read more about phishing and what you need to do to protect your private information. View this tutorial to learn more.

 

Emporia State University's Peer to Peer File Sharing Statement

Emporia State University’s security policies are in place not only to help protect ESU’s information, but to set standards on acceptable computing using ESU’s Internet access. ESU’s Digital Millennium Copyright Act (DMCA) policy states:

“..users of Internet services and equipment and equipment provided by ESU are responsible for their compliance with all copyright laws pertaining to information they place on or retrieve from the Internet.” Continue reading.

 

Incident Reporting Procedures

An Information Security (IS) incident is something that has happened to compromise the information of students, faculty, and/or staff, as well as ESU business information. An IS incident could be:

  • Your ESU owned computer or laptop is missing
  • Your ESU network account is being used when you are not using it
  • Someone else's UserID is showing on your logon screen
  • You notice unsafe information protection practices.

When IS incidents happen, serious threats and consequences can occur. ESU faculty and staff are responsible for reporting suspected or known security incidents, including any observed or suspected security weaknesses in ESU systems or services. (Read the IS Incident Reporting procedures.) You may also access this information at Techsite; look in the Employee section under Information Security Procedures.