By following good security practices we can help others in the University community benefit from decreased risk. "Good neighbor" security practices help others for the common good. Technology should be reviewed for conformance to industry and University policies, practices, and guidelines prior to deployment rather than after a problem or incident. Members of the University community can help themselves and others by increasing the visibility and support for security within their department or work-group. The following security best practices have been sorted into 3 sections, Resources for Everyone, for Faculty and Staff and for System Administrators and IT Managers. Click on the section heading or "more" button below each heading to get to the full resources.
Computer Security Protections Checklist
Enterprise Information Security Program
Guidelines for Classifying Institutional Data - A guide to assist Business Owners to determine institutional data's relative sensitivity. Based on that sensitivity level, certain information security controls are required to appropriately secure the data.
Site Licensed Publications
The "pdf" document resources below have been purchased for general use by the University of Iowa community. All faculty, staff, and students affiliated with The University of Iowa are licensed to download, view, and/or print these reference documents. The license for these documents does NOT allow sending them to others via electronic mail, printing or photocopying the documents and giving or mailing them to others, or otherwise sharing them with anyone who is not affiliated with The University of Iowa.
NOTE: Adobe Acrobat Reader version 5.0 or later is recommended for viewing these documents. See Adobe for a copy of this software.
- Linux.1 - Securing Linux: Step By Step V1.0 (Part One)
- Linux.2 - Securing Linux: Step By Step V1.0 (Part Two)
- Win2000 - Securing Windows 2000 Step by Step V1.
- Solaris - Solaris Security Step By Step V2.0
- Incident Handling - Computer Security Incident Handling Step by Step V1.5
Discovering Personally Identifiable Information with Identity Finder
E-Discovery - What is E-Discovery and ESI?
Encryption Guidelines - Encryption is required for level 3 highly sensitive institutional data stored on mobile devices and external network transport.
Hawk IRB -Information Security Guidance for researchers
Health Insurance Portability and Accountability Act of 1996 - HIPAA Security Regulations Compliance
The Uiowa System Registry (USR for short) - A helpful web-based application which allows system administrators to register their system(s) with the Information Security and Policy Office.
Iowa Computer Security Incident Response Team - I-CSIRT Program
SSL Server Certificates Service
UI Disaster Recovery and Business Continuity Planning Resources
UI Network Security Scanning Service