Information Security at UVa
Find out about practices, policies, and other aspects of security relevant to your role(s) at UVa:
- Personal computer user
- Server or network administrator/LSP
- Department manager/Principal Investigator
University Data Protection Standards
The University's outline requirements for handling and protecting all the University's institutional data, whether the information is highly sensitive, moderately sensitive, or not sensitive. For a downloadable copy of the current version of the standards (PDF format) visit the Data Protection website. Version 2.0, released Dec. 20, 2013, introduces substantial changes.
Suspicious Email Alerts Website
Want to know if that weird email message you received is a scam or spam? The Suspicious Email Alerts Page will help you check to see if what you've received is similar to other suspicious or fraudulent emails, phishing scams, or schemes to commit identity theft that are currently circulating at UVa. To make it even easier, subscribe to these security alerts and warnings via an RSS feed.
Remember, if you receive an email with text similar to these messages, DO NOT respond—delete it immediately! Do not click any links in the email, and do not “unsubscribe” or acknowledge the email in any way. If you receive an email that appears “phishy” and are unsure if it's legitimate, and it is not listed, please report it to us; forward it to our email abuse team.
Highly Sensitive Data Protection Policy
The University's highly sensitive data policy, strictly limiting the circumstances under which sensitive data may be stored on individual-use electronic devices and media, and mandating that strict security requirements be met when such storage is unavoidable. It is the responsibility of individuals to determine if they have highly sensitive data on their device(s) and media and, if so, to ensure compliance with this policy.
- Records Management
- Cybersecurity Events
- Suspicious Email Currently Circulating at UVa & Security Alerts...Subscribe via RSS
- Responsible Computing Tutorial for Faculty and Staff
- Requirements for Securing Electronic Devices
- University Data Protection Standards
- Encryption Methods
- Identifying Data with Identity Finder
- Secure Deletion Shredder
- IT Security Risk Management
- ... Disaster Recovery
- ... Project Review Questionnaire
- Reporting a Security Problem
- Identity Theft
- Security Tips for Travelers
- Choose Strong Passwords