Skip to content

The Information Security Office (ISO) continuously strives for daily operational excellence
to ensure the confidentiality, availability, and integrity of University of Utah information technology systems and data through appropriate security resources and best practices.


The U's Park Building, overlaid with a duotone of yellow and orange

President Randall approves revised information security policy

The changes comply with the recently updated Utah Board of Higher Education Policy R345: Information Technology Resource Security and strengthen the university’s information security policy to address the present and increasing risks of cybersecurity incidents.

A magenta brain formed by a close-knit network of overlapping and intersecting lines on a black background and above a grid of magenta lines.

A white outline of a shield with a keyhole surrounded by circles of dotted and dashed lines on top of a purple-hued image of the Earth. The photo illustration includes ones and zeros, and technology icons to the left and right of the shield.

AI use guidelines from an
IT leadership perspective

Artificial intelligence (AI) tools must be used with caution to avoid known pitfalls, such as bias, privacy violations, copyright infringement, and inaccuracy. These guidelines are intended to support institutional standards for privacy, safety, ethical practices, and data security. 

Shields up! Protect yourself online with these simple steps.

October, designated as Cybersecurity Awareness Month, is a good time to review the basics of cybersecurity — easy and common-sense ways to protect your data and devices from threat actors and cybercriminals.

Top IT Support Topics

Helpful Links

U of U IT News & Info

IT Security advisories

Tips & resources

U of U virtual private network

To access certain resources on the University of Utah network, campus employees and students who work or study remotely and and hospital/clinics personnel who work remotely should use a secure virtual private network (VPN).

University of Utah VPN options:
  • Palo Alto Global Protect 
  • Departmental VPN


Secure those passwords!

Secure those passwords!

Is your password secure enough?

Easy-to-guess, "weak" passwords are the main way criminals gain access to system information. Keeping passwords safe and hard to guess is critical to ensure information is not compromised.

Take a moment to review the University of Utah's password requirements and guidelines.


IT security software available through OSL

IT security software essentials

With antivirus and firewall software, you can better protect your information and reduce the risk to your computers from malicious attacks. Both are available at a reduced cost through the U's Office of Software Licensing (OSL).

Licenses are available for university organizations, work-at-home staff and faculty, and student, faculty, and staff with personally-owned computers.


University-approved platforms for restricted and sensitive data

Due to the level of risk associated with restricted and sensitive data, the university has approved only a select number of platforms for those data types. Our security matrix provides an overview of some popular platforms and the data types for which they are approved.


FERPA: How to securely share and store student data

We created a couple of resources to help instructors and students understand which applications and devices can be used to share and store FERPA-protected data, especially as more of us use new platforms to learn, teach, and connect remotely.

Flowchart: Is this platform safe? READ MORE

Telecommuting? Follow these IT best practices.

Compared to working on campus, telecommuting can present different information security risks, especially when it comes to network security, data storage, and physical security. By following these best practices, you can help protect yourself and the university from cyberthreats.


Last Updated: 9/27/23