Search Google Appliance

Information Technology

Security Support Articles

  • On This Page: A. Restricted Data B. Confidential Data C. Operational Use Only Data D. Unclassified Data At UMass Amherst, University data falls into four categories: restricted, confidential, operational use only, and unclassified. Each category denotes a unique level of sensitivity and...
  • State and federal legislation and University policies mandate that campus departments take appropriate steps to protect the sensitive data available to them. To comply with these requirements and enable the University to respond in case of a security breach, academic and administrative...
  • Please report an information security incident or any phishing attempts immediately to itprotect@umass.edu. If you suspect a compromise or unauthorized access to credit card information: Also contact the campus ecommerce representative immediately (pci@admin.umass.edu) to initiate the appropriate...
  • The Problem with Multiple Network Connections & Network Bridging Many laptop and some desktop computers have both wired and wireless network adapters or cards. These two cards allow you to establish simultaneous wired and wireless connections to the campus network. While this simultaneous...
  • What are electronic signatures? An electronic signature is a simple and often legally recognized way to indicate consent or approval on a digital document or form. Unlike electronic signatures, digital signatures are a specific implementation of an e-signature that requires the signer to have a...
  • Full Disk encryption allows only authorized individuals to log in to your laptop or desktop. An IT professional can add specific individuals to a list of pre-authorized users who can log in to the computer, but once they have logged in, the data will be accessible to anyone using that machine until...
  • The implementation of the foundational security controls (anti-virus, patch management, encryption, and firewalls) reduces the risk of accidental, malicious or unauthorized disclosure, misuse, modification, destruction, loss and/or damage to university information, research data and computing...
  • Adobe eSign (formerly EchoSign) is a cloud-based platform that allows you to send digital documents, such as contracts and forms, directly to signers. Signers can return the signed document electronically and securely through the eSign interface. Complete Your Account Setup Once your eSign...
  • About Hard Drive & Tape Destruction UMass Amherst Information Technologies (UMass Amherst IT) provides departments, faculty, and staff with a convenient, no cost way to destroy and dispose of hard drives, backup tapes, and other magnetic media that contain sensitive or confidential...
  • UMass Amherst IT currently offers departments several tools that can help protect computers and data, and mitigate potential data security incidents. Identity Finder to Locate Sensitive Data Identity Finder is an application that locates sensitive data (a.k.a. personally identifiable...
  • What is Identity Finder? Identity Finder is a program that locates sensitive data (e.g., Social Security Numbers, credit card numbers) on desktops, laptops, servers, and other media. Identity Finder helps you inventory the sensitive data on your devices, making it easier to secure or remove data...
  • What is InfoBlox DNS Firewall?  Infoblox DNS Firewall is malware protection and Domain Name Service (DNS) that blocks access to known bad domains. This service aims to reduce the number of malware infections caused by drive-by downloads, malicious downloads, and phishing, and will reduce the...
  • Information Management is the practice of treating information as an institutional resource that requires rules and practices for business process, privacy, security, compliance and risk management. UMass Amherst staff, faculty, and students working with university data must comply with campus...
  • Information Management is the practice of treating information as an institutional resource that requires rules and practices for business process, privacy, security, compliance and risk management.   Although information management applies to all forms of institutional information and research...
  • When coming to campus this fall, it is important to remember to protect your personal information when selecting and using apps on your smartphone and tablet, and when using Internet applications and services. Before installing any application, be sure to review the apps privacy policy, review the...
  • Under the FERPA law, most student information is confidential and should be handled with care. By securing your computer and work environment, you can now avoid accidents where student's personal, financial, or academic information falls in the wrong hands. Our information security tips provide a...
  • McAfee Security for University-owned computers (also known as McAfee Security with ePO support) is a centrally-connected program you can use to protect your files, programs, and email from malware and other malicious software on University-owned devices. By connecting to a central console, this...
  • McAfee VirusScan Enterprise for University-owned computers (also known as McAfee VirusScan with ePO support) is a centrally-connected program you can use to protect your files, programs, and email from malware and malicious software on your University-owned devices. By connecting to a central...
  • Malwarebytes' Anti-Malware software is a program you can use to protect your computer from spyware, adware, and other malicious software. For maximum protection, UMass Amherst IT recommends that you use both Malwarebytes and McAfee VirusScan once a month.Note: Malwarebytes is a Windows-only...
  • McAfee Security is a program you can use to protect your computer files, programs, and email from viruses and malicious software (malware). Note: These instructions are for the version of McAfee Security available for students and use on personal, non-University-owned computers. Obtain &...

Pages