Security

Rationale

An institution's information assets are important to protect.  Measures must be taken to protect these assets from unauthorized modification, destruction, or disclosure whether accidental or intentional as well as to assure its confidentiality, integrity, and availability.  Best practices should be deployed to support this rationale.  The objectives of information security should include:

1. Protecting the privacy of students, employees, and associates.
2. Protecting the institution from financial loss.
3. Protecting the reputation of the institution.
4. Maintaining a reasonable level of service availability.

The goal of Information Technology Services is to maintain these basic security objectives while utilizing best practices in all systems managed or developed.  ITS achieves this with all employees maintaining a focus on information security in their daily tasks.

Some of the best practices for security include but are not limited to:

  • Authentication
  • Authorization
  • Systems
Many of these best practices can be applied in your home use of technology.  There are a number of ways to protect yourself when utilizing technology.  Read more....