Skip to main content
The University of Iowa

IT Security & Policy Office

  • Home
    • ISPO Contact Information
  • Incidents
    • FAQ: Turning Off Network Ports
    • Report A Security Incident
    • Request for Change to Departmental NSC Information
    • Know your Responsibilities as an NSC
    • Digital Millennium Copyright Act (DMCA) of 1998
  • Services
    • Computer Data and Media Disposal Policy Training
    • Port Enable Form
    • Finding and Protecting Sensitive Data
    • Credit Card Handling (PCI-DSS) Standards Compliance
      • PCI Compliance FAQs
    • Security Awareness Course
    • UIOWA System Registry
    • Client Certificates
    • Web SSL Certificates
    • Firewall request
    • UI Anywhere
    • Vulnerability Scan Request
    • Penetration Testing
    • Security Consulting and Compliance
  • Resources
    • Core Security Standards
    • Awareness & Education
      • Presentation Resources
      • Multimedia
      • Security Awareness Materials
    • Faculty & Staff
      • Best Practices for Email Attachments
      • Check your security
      • Enteprise Information Security Program
      • Information Security in the Workplace
    • Everyone
      • Zoom Security and Privacy
      • Working Remotely
      • Defense in Depth Security Strategy
      • Best Practices for Instant Messaging
      • COPYING AND DISTRIBUTION OF COPYRIGHTED MATERIAL
      • Compliance
      • Copyright and the University of Iowa
      • Departmentally Managed Campus Computers: Your Responsibilities
      • End User Self-Managed Campus Computers: Your Responsibilities
      • File Sharing
      • Institutional Data Classification Guidelines
      • Protecting your Home Computer and your Privacy
      • ResNet Compromise
      • copyright-info
      • learnaboutsecurity
      • workstation
    • System Administrators and IT Managers
      • Disaster Recovery & Business Continuity Planning
  • University IT Policy
    • Policy Feedback
    • About University IT Policy
    • Best Practices
    • Enterprise IT Policy Process
    • HIPAA
      • FAQs
      • Policies
      • Forms
      • Training & Contact Info.
      • HIPAA-Docs
      • HIPAA Requirements
      • HIPAA Security Samples - Reference ONLY

You are here

  • Home
  • /
  • Resources

System Administrators and IT Managers

Best Practices for Managing Logs

CERT's Guideline's UNIX Configuration
Cloud Computing

Defense in Depth - Security at Iowa

E-Commerce: Payment Card Industry Data Security Standards (pdf) from VISA 

E-Discovery/ Litigation Holds - What is E-Discovery and ESI?
Eight Steps to Secure Your Copier or Multi-Function Device
Encryption Support Resources for IT-Admins

Departmental Access to E-mail/Home Drive Accounts Procedures

Iowa Computer Security Incident Response Team - I-CSIRT Program
Iowa Regents Security and Network Log Retention Guidelines
IT Security Plan Template
ITS Linux & Unix Systems Support

Learn About Security (IT)

SANS - Top Cyber Security Risks!
Secure-removal-of-data
Self-Managed Computers: Guide
SSL Web Server Certificate Service

Travel Checklist

UI Disaster Recovery and Business Continuity Planning Resources
UI Network Security Scanning Service

 


University IT Policies
Resources for Everyone
Resources for Faculty and Staff

 

Contact

tel: 319-335-6332
email: it-security@uiowa.edu