Sign In / Sign Out
Navigation for Entire University
- ASU Home
- My ASU
- Colleges and Schools
- Map and Locations
ASU’s Computer, Internet, and Electronic Communications Information Management Policy, ACD125. All members of the ASU community are bound to this policy.
Links to ASU policies, standards, and guidelines related to information security.
ASU’s Data Handling Standard defines the classifications of information sensitivity and the minimum standard for protection of University managed information in any form.
ASU’s Data Storage Matrix identifies network and cloud storage services that can be used for specific data types.
Your senior TAG representative is a voice for your unit in IT policy and a conduit for some information access needs.
ASU’s encrypted wireless service helps to protect your Internet communications from eavesdropping while on campus.
Includes a best practices document for using Dropbox at ASU and a link to sign up for a Dropbox account.
Gives additional background information and links to detailed instructions to encrypt devices and network communications.
Includes additional tips for securing connected devices physically.
Article describes a study showing that many who find lost smartphones look for personal information on them,
including passwords, online banking details, and email messages.
The LiveSafe mobile app helps ASU community members communicate with ASU Police, Safety Escort Service, and Motorist Assist.
Online interview with Fulton Schools of Engineering professor about “smart” devices, the risks they present, and measures people can take to protect them.
Describes the “Internet of Things” in detail including applications, standards, regulations, controversies, and privacy and security concerns.
Brief training videos and enrollment procedures for using Duo two-factor authentication to enhance your login security at ASU.
Information on acquiring, installing, and using LastPass to manage your passwords on ASU systems and other online services.
Questions and answers about using, securing, and changing your ASURITE password.
Article describes (and clarifies) the 2017 ransomware attack interfering with an Austrian hotel’s ability to program keycards for guests checking in.
Description of phishing techniques, risks, and protective measures.
Catalog of past and current specific phishing messages sent to members of the ASU community, and instructions for reporting a suspected phishing message you’ve received.
Information for reporting and handling information security incidents and events, including links to ASU’s Incident Response Standard and a summary of the procedure.
Documentation and online self-assessment guidelines for the ASU security review process, highly recommended before implementing new systems and/or significant changes to existing systems. This process is required for all UTO sponsored projects.
Boilerplate information security language required in contracts between ASU departments and entities providing services involving ASU data and/or systems.