Download presentation
Presentation is loading. Please wait.
Published byLeonard Mells Modified over 10 years ago
1
Technology October 12, 2006
2
Data Security Verbal & Written – When to share data Other IU departments & employees Legitimate business need Employee and/or student approves Vendors Legitimate business need Has provided a signed statement indemnifying IU General Public (including former employees) Never
3
Data Security Paper – How to dispose Never toss paper (printed forms, reports, scrap paper, etc.) with confidential data in the trash Always shred paper containing confidential data, preferably with a cross-cut shredder Contact Shred-It or Confidential Document Destruction for pickup and shredding of confidential materials The IU Warehouse offers storage of paper files when it comes time to clean out your file cabinets (iuwh@indiana.edu or 855-9837 )iuwh@indiana.edu
4
Data Security Electronic Data Email – Never send confidential data via email either in the body of the email or as an attachment Lock unattended PCs Limit the number of employees who have access to confidential data on our servers Do not store confidential data on portable devices Remove access for former employees from our servers Password protect any document or database that contains sensitive data Hard drives Sent to Surplus Under Dell Warranty
5
Copyright Infringement IU does not actively search for inappropriate downloads First offense: User is notified & allowed 24 hours to remove the file Must complete a tutorial and pass a quiz If user does not comply or fails the quiz within 24 hours, PC is blocked from network until user passes quiz Second offense: User is notified & allowed 24 hours to remove the file Must complete a tutorial and pass a quiz If quiz is not passed within 24 hours, PC is blocked from network for two weeks All access is lost (VPN, dial up, wireless, etc.) User is referred to appropriate disciplinary office - UHRS
6
Copyright Infringement Third offense: User’s PC is immediately blocked from the network indefinitely All access is lost (VPN, dial up, wireless, etc.) indefinitely User is referred appropriate disciplinary office - UHRS
7
Copyright Infringement How to avoid copyright infringement: The file sharing program does not allow sharing Have permission to share from copyright holders Confirm the distributor has permission from the copyright holder Read license to ensure you have permission to share or convert the file(s) to other formats Scan your PC with Ad-Aware to ensure spyware was not installed with the file sharing application
8
New Technology Passphrases Replaces network passwords Security measure implemented by UITS New employees & any employee who wants to change their password will be required to select a passphrase You will not be required to change your current password Simple passwords should be changed Easily “crackable” – joe12345 Contains a word that is identifiable with you (i.e. a child’s name, dog’s name, etc.)
9
New Technology Passphrases must: Contain a minimum of 15 characters & maximum of 127 characters Use at least four unique characters (letters, numbers, or symbols) Use at least four words. "Word" is defined as two or more distinct letters; words must be separated by one or more non- letter characters (i.e. leaves*are_falling^in Bloomington contains five "words")
10
New Technology Passphrases must not: Contain your name or username Use the at sign ( @ ), the number sign ( # ), or the double-quote mark ( " ) Be a common phrase (e.g., to be or not to be or april showers bring may flowers) Be based on predictable patterns (e.g., the alphabet or the layout of a standard keyboard)
11
New Technology Slashtmp Server dedicated to sharing large files with anyone 1 Gigabyte of space Easily upload files to share https://www.slashtmp.iu.edu/
12
Slashtmp Interface
15
New Technology IU Vault Server dedicated to sharing encrypted files with anyone 200 Megabytes of space Easily upload confidential files to share Password protected https://iuv.indiana.edu/
16
IU Vault Interface
20
New Technology Spam Filter for Email Outlook “Junk E-mail” folder Replaces the “Quarantine” service Sends suspicious email to “Junk E-mail” folder Automatically deleted in 5 days Disable filtering while on vacation Begins October 17, 2006
21
Spam Filter
23
New Technology Unified Messaging Service (UMS) Sends voice mail to your email box Forward to designated phone number Forward specific callers to designated phone number Custom greetings based on caller’s phone number Forwards a copy of voice mail to an email address Cost is same as regular voice mail
24
New Technology Big Red Research computer Nation's fastest university-owned supercomputer Twenty third fastest in the world 20.4 trillion mathematical operations per second METACyt (Indiana Metabolomics and Cytomics Initiative) Grant $53 million from the Lilly Endowment Focus on cell metabolism and function
25
New Technology Breeze Meetings Web collaboration with remote participants Participants only need web browser with Flash plug-in Features Digital whiteboard Text chat Polling Audio/video broadcasting Must have a Breeze account to host a meeting
26
New Technology Breeze Meetings
27
The End http://www.indiana.edu/~vpapcs/ http://vpad.service.indiana.edu/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.