Skip to main content
The University of Iowa

IT Security & Policy Office

  • Home
    • ISPO Contact Information
  • Incidents
    • FAQ: Turning Off Network Ports
    • Report A Security Incident
    • Request for Change to Departmental NSC Information
    • Know your Responsibilities as an NSC
    • Digital Millennium Copyright Act (DMCA) of 1998
  • Services
    • Computer Data and Media Disposal Policy Training
    • Port Enable Form
    • Finding and Protecting Sensitive Data
    • Credit Card Handling (PCI-DSS) Standards Compliance
      • PCI Compliance FAQs
    • Security Awareness Course
    • UIOWA System Registry
    • Client Certificates
    • Web SSL Certificates
    • Firewall request
    • UI Anywhere
    • Vulnerability Scan Request
    • Penetration Testing
    • Security Consulting and Compliance
  • Resources
    • Core Security Standards
    • Awareness & Education
      • Presentation Resources
      • Multimedia
      • Security Awareness Materials
    • Faculty & Staff
      • Best Practices for Email Attachments
      • Check your security
      • Enteprise Information Security Program
      • Information Security in the Workplace
    • Everyone
      • Zoom Security and Privacy
      • Working Remotely
      • Defense in Depth Security Strategy
      • Best Practices for Instant Messaging
      • COPYING AND DISTRIBUTION OF COPYRIGHTED MATERIAL
      • Compliance
      • Copyright and the University of Iowa
      • Departmentally Managed Campus Computers: Your Responsibilities
      • End User Self-Managed Campus Computers: Your Responsibilities
      • File Sharing
      • Institutional Data Classification Guidelines
      • Protecting your Home Computer and your Privacy
      • ResNet Compromise
      • copyright-info
      • learnaboutsecurity
      • workstation
    • System Administrators and IT Managers
      • Disaster Recovery & Business Continuity Planning
  • University IT Policy
    • Policy Feedback
    • About University IT Policy
    • Best Practices
    • Enterprise IT Policy Process
    • HIPAA
      • FAQs
      • Policies
      • Forms
      • Training & Contact Info.
      • HIPAA-Docs
      • HIPAA Requirements
      • HIPAA Security Samples - Reference ONLY

You are here

  • Home
  • /
  • Resources

For Everyone

10 Steps to Securing ResNet Connection

Best Practices for E-Mail Attachments
Best Practices for File Sharing
Best Practices for Instant Messaging

Cloud Computing
Copying and Distribution of Copyrighted Material
Copyright and the University of Iowa
FileComputer Security Protections Overview

Desktop Locking

Encryption Guidelines and Support
Enterprise Information Security Program

Guidelines for Classifying Institutional Data

Hawk IDs and Passwords
How to handle spam

Information Security in the Workplace

Learn About Security (IT)

Protecting your Home Computer
What to do if your ResNet computer has been compromised

Secure-removal-of-data
Securing your Linux System
Security Checklist Form
Self-Managed Computers: Guide
SPAM electronic mail

Travel Checklist

Working Remotely

Zoom Security and Privacy


University IT Policies
Resources for Faculty and Staff
Resources for System Administrators and IT Managers

Contact

tel: 319-335-6332
email: it-security@uiowa.edu