UFIT is here to assist you with research at UF while remaining compliant with all applicable federal, state, and university information security policies. Information Security can guide you with expediting purchases via Integrated Risk Management’s (IRM), and pre-assessed “Fast Path” solutions.
Important Information Security Policies
- UF’s Mobile Computing and Storage Devices policy
- Data Classification Policy and Using Restricted Data
- UF Data Guide Not all data classifications are created equal, so it can get very complex to appropriately classify data. This guide will help you understand your data type within UF's data classification guidelines. This guide can also be used to find approved software and computing infrastructure for use with various data types.
What is?
- Integrated Risk Management : UF’s IRM was created to provide efficient inter-department coordination across UF and UF Health, to deliver clear communications in a timely manner.
- Pre-Assessed “Fast Path Solutions” : Software applications that have been vetted for use with certain data types and operating environments. These solutions provide a streamlined process to enable faculty and staff to use pre-vetted solutions to fast track through the IT’s risk assessment process
Always Protect Your Identity
- How Phishing Emails Work - Phishing (pronounced “fishing”) is a process by which someone tries to obtain your private information using deceptive means, usually by sending an email that appears to come from a business, bank, school, or other organization you trust.
- Mobile Device Security – Everything you need to know to protect your mobile devices.