Search Google Appliance

Information Technology

Security Support Articles

Filtered Results:

  • Computers compromised by malware are the most common data security incident on campus. Departments can choose to handle portions of an incident internally (using the checklist below) or contact UMass Amherst IT at security@umass.edu as soon as possible. If your department’s computers are...
  • Any data security incident involving a University-owned devices or personal devices containing sensitive University data should be taken seriously. Responding to data security incidents promptly and efficiently helps protect the University's assets (e.g., data, computers, networks) and ensures...
  • Any data security incident involving a University-owned or personal device containing sensitive University data is serious. Responding to data security incidents promptly and efficiently helps protect the University's assets (e.g., data, computers, networks) and ensures compliance with state and...
  • The Microsoft Rights Management Service (RMS) allows you to restrict access to Microsoft Office documents to specific individuals. RMS is integrated into Microsoft Office and is available for faculty and staff. Check with the IT professional in your department for assistance in enabling RMS for...
  • Your computer has been disconnected from the campus network and placed in the IT Safety Net. This is a holding area designed to protect the network from computers that are infected, compromised, or violate University policies. You can only access University email, SPIRE, and the IT Web site until...
  • Note: Under a new university-wide contract, Sophos Intercept X Advanced is replacing McAfee endpoint protection at UMass Amherst. More information will follow. For questions, contact the IT professional in your department as applicable, or IT User Services. Stay on track with the latest security...
  • Note: Under a new university-wide contract, Sophos Intercept X Advanced is replacing McAfee endpoint protection at UMass Amherst. More information will follow. For questions, contact the IT professional in your department as applicable, or IT User Services. Faculty and staff can protect their...
  • Once you have an electronic signature account, you can send documents for electronic signatures. This document will cover how to add Signature and Form fields to documents such as contracts, agreements, and estimates. Note: Exact steps and interface appearance may vary based on operating system...
  • This is draft documentation for the new Information Security Policy. We are actively developing this content and are soliciting feedback on it. Service administrators must ensure there is a written plan that describes how the standards established in the Information Security Policy apply to each...
  • Understand The Risks Behind Peer-to-Peer (P2P) Applications Peer-to-peer (P2P) software enables users to download and share content with other users in the same P2P network. They may even share your files without your knowledge. Often, this content is protected by copyright. Under U.S....
  • Anyone who receives a document with Adobe Sign (formerly eSign) can electronically sign and return them using a web browser or mobile device. Signers do not need to have an electronic signature account. This guide will cover how to sign and return a document through Adobe Sign. Note: Exact steps...
  • What is Spirion ? Spirion is a program that locates sensitive data (e.g., Social Security Numbers, credit card numbers) on desktops, laptops, servers, and other media. Spirion helps you inventory the sensitive data on your devices, making it easier to secure or remove data, and take the...
  • A. Understand the Terms ‘Sensitive data’ is a blanket term used to designate classes of data with a high level of sensitivity that the University is legally or contractually required to protect. Based on the University's data classification model, sensitive data at UMass Amherst refers to...

Pages