Professor Christopher P. Manfredi, Provost and Vice-Principal (Academic), describes the responsibility of all academics to uphold 缅北强奸's information security.听
Academics and cybersecurity
Ensure cybersecure practices in all teaching and learning activities.听
Access 缅北强奸's systems safely
- Enable two-factor authentication on your 缅北强奸 account. Two-factor authentication (2FA) is required on all 缅北强奸 accounts because it helps verify that you are the person who is signing into your鈥痑ccount. Don鈥檛 delay, enroll now at
- 缅北强奸's (VPN) allows you to connect to restricted sites and resources.
- Ensure your device is secure when connecting to 缅北强奸 remotely (see Secure your devices section ).
Stay safe when working remotely听
- Preparing for remote work听- Follow these guidelines to ensure safe computing from a distance.
- : Find valuable resources in Safe at home: a module in the online course IT Security Awareness Essentials听(available on myCourses).
Protect your identity
- that attempt to steal your personal information.
- Strengthen and protect your password:
- Your 缅北强奸 password is for 缅北强奸 systems. Do not use your 缅北强奸 password on non-缅北强奸 systems or websites.
- .
- Do not share your password with anyone.
- Use a different password for each platform or system.
- Do not overshare on social media: Tips for safe sharing
Safeguard student data
Only use 缅北强奸-approved storage and collaboration solutions for storing students' personal data. All educational software used for teaching and learning must comply with the 缅北强奸 Cloud Directive.
缅北强奸 supports academic activities with a range of secure teaching and learning solutions. See the full list of 缅北强奸-approved cloud services for software supporting secure data storage, file sharing, publishing and collaboration.
Software: considerations
Note that if you recommend a solution to students that is not 缅北强奸-approved, you are legally responsible for any resulting consequences. For more information, see IT Policies, Regulations, Directives & Standards.
- 缅北强奸's cloud services website provides additional information, including:
- Cloud solution approval process
- What is personal information? Types of data and what can be stored in the cloud
- Software Piracy : Unauthorized software use can have serious consequences. Ensure that your software use complies with licensing agreements.
缅北强奸-approved teaching solutions
Here is a sample of available tools and services available.听
- : 缅北强奸's learning management system for online teaching and learning
- : Technology supporting live, interactive question and response and learning assessment.
- : As part of the Microsoft Office 365 offering, Microsoft Forms allows users to quickly and easily create surveys, quizzes, registration forms, and polls.
- : Allows users to create surveys and publish to a public or a private audience.
- Teaching and learning technologies (缅北强奸 Teaching and Learning Services site)
Secure your devices
Follow some basic safety tips to keep your devices safe:
- 听and password-protect to help prevent unauthorized access.
- Apply regular updates:
- whenever possible.
- Install antivirus software:
听