Search Google Appliance

Information Technology

Data Security Support Articles

We're taking you to an updated version of this article.

UMass Amherst Information Technology support articles are now updated in the new IT Knowledge Base. We found an updated version of this article, so we're sending you there.

Taking you to:

umass.service-now.com/sp
Redirecting in
10s

Stay here to view this page in the legacy Support Center.
Information may be outdated as these articles are no longer maintained.

Find answers to your tech questions in the new IT Knowledge Base.

UMass Amherst Information Technology support articles are now updated in the new IT Knowledge Base.

This article is part of our archived legacy Support Center and may be outdated or inaccurate.
We did not find an updated version of this article. That means this archived content is more likely to be outdated or no longer relevant.
Check the new IT Knowledge Base for updated information:

More tech help options

  • On This Page: A. Restricted Data B. Confidential Data C. Operational Use Only Data D. Unclassified Data At UMass Amherst, University data falls into four categories: restricted, confidential, operational use only, and unclassified. Each category denotes a unique level of sensitivity and...
  • State and federal legislation and University policies mandate that campus departments take appropriate steps to protect the sensitive data available to them. To comply with these requirements and enable the University to respond in case of a security breach, academic and administrative...
  • Please report any information security incident, any identified vulnerability in information assets, or any phishing attempts immediately to itprotect@umass.edu. If you suspect a compromise or unauthorized access to credit card information: Also contact the campus ecommerce representative...
  • About Hard Drive & Electronic Storage Destruction The UMass Amherst Office of Waste Management provides departments, faculty, and staff with a convenient, no cost way to destroy and dispose of computers, hard drives, backup tapes, and other electronic and magnetic storage media that contain...
  • UMail will be retired in early 2020 as it has reached end-of-life and will no longer be supported. Faculty and staff using UMail will receive additional information as migrations to Google Mail and Microsoft Exchange continue. Information Management is the practice of treating information as an...
  • Computers compromised by malware are the most common data security incident on campus. Departments can choose to handle portions of an incident internally (using the checklist below) or contact UMass Amherst IT at security@umass.edu as soon as possible. If your department’s computers are...
  • Any data security incident involving a University-owned devices or personal devices containing sensitive University data should be taken seriously. Responding to data security incidents promptly and efficiently helps protect the University's assets (e.g., data, computers, networks) and ensures...
  • The Microsoft Rights Management Service (RMS) allows you to restrict access to Microsoft Office documents to specific individuals. RMS is integrated into Microsoft Office and is available for faculty and staff. Check with the IT professional in your department for assistance in enabling RMS for...