Skip to main content
The University of Iowa

IT Security & Policy Office

  • Home
    • ISPO Contact Information
  • Incidents
    • FAQ: Turning Off Network Ports
    • Report A Security Incident
    • Request for Change to Departmental NSC Information
    • Know your Responsibilities as an NSC
    • Digital Millennium Copyright Act (DMCA) of 1998
  • Services
    • Computer Data and Media Disposal Policy Training
    • Port Enable Form
    • Finding and Protecting Sensitive Data
    • Credit Card Handling (PCI-DSS) Standards Compliance
      • PCI Compliance FAQs
    • Security Awareness Course
    • UIOWA System Registry
    • Client Certificates
    • Web SSL Certificates
    • Firewall request
    • UI Anywhere
    • Vulnerability Scan Request
    • Penetration Testing
    • Security Consulting and Compliance
  • Resources
    • Core Security Standards
    • Awareness & Education
      • Presentation Resources
      • Multimedia
      • Security Awareness Materials
    • Faculty & Staff
      • Best Practices for Email Attachments
      • Check your security
      • Enteprise Information Security Program
      • Information Security in the Workplace
    • Everyone
      • Zoom Security and Privacy
      • Working Remotely
      • Defense in Depth Security Strategy
      • Best Practices for Instant Messaging
      • COPYING AND DISTRIBUTION OF COPYRIGHTED MATERIAL
      • Compliance
      • Copyright and the University of Iowa
      • Departmentally Managed Campus Computers: Your Responsibilities
      • End User Self-Managed Campus Computers: Your Responsibilities
      • File Sharing
      • Institutional Data Classification Guidelines
      • Protecting your Home Computer and your Privacy
      • ResNet Compromise
      • copyright-info
      • learnaboutsecurity
      • workstation
    • System Administrators and IT Managers
      • Disaster Recovery & Business Continuity Planning
  • University IT Policy
    • Policy Feedback
    • About University IT Policy
    • Best Practices
    • Enterprise IT Policy Process
    • HIPAA
      • FAQs
      • Policies
      • Forms
      • Training & Contact Info.
      • HIPAA-Docs
      • HIPAA Requirements
      • HIPAA Security Samples - Reference ONLY

You are here

  • Home
  • /
  • Resources

Faculty & Staff

Best Practices for E-Mail Attachments

Best Practices for Instant Messaging

Cloud Computing

PDF iconitconfidentialitystatement.pdf

Criminal Background Check Policy and Forms

Defense in Depth - Security at Iowa

Desktop Locking


E-Discovery -What is E-Discovery and ESI?
Eight Steps to Secure Your Copier or Multi-Function Device
Encryption Support Resources for IT-Admins

Hawk IRB -Information Security Guidance for researchers
Health Insurance Portability and Accountability Act of 1996 - HIPAA

Identity Finder resources

Learn About Security (IT)

Secure-removal-of-data
Securing your Linux System
Self-Managed Computers: Guide

Travel Checklist

The Uiowa System Registry

Web Resources on Copyright and Fair Use

 

 


University IT Policies
Resources for Everyone
Resources for System Administrators and IT Managers

Contact

tel: 319-335-6332
email: it-security@uiowa.edu