Plain English Guide to the Information Security Policy
RIT has issued an Information Security Policy. The Policy provides the strategic direction needed to implement appropriate information safeguards for RIT information and the Institute network. This Plain English Guide provides explanation and illustration of the Policy and is provided as an aid to help you understand and implement the requirements of the Policy. The Policy itself is authoritative. The policy is effective immediately.
Why did RIT issue the policy?
The Policy authorizes RIT to take reasonable measures to protect RIT information and computing assets in an age... ...
Mobile devices are not always designed with security in mind and, as a result, are not as secure as most computers.
There are a number of ways in which information on a mobile device may be breached: theft of the device, attacks on your service provider, wireless hijacking or "sniffing", and unauthorized access. Because mobile devices may be more easily stolen or compromised, users of these devices must take precautions when using them to store or access Private or Confidential information.
RIT requires all communications relating to Institute academic or business purposes to be signed with an appropriate signature. This includes e-mails from both RIT and non-RIT accounts, as well as MyCourses and Message Center communications. For more information on the new requirements, visit our Signature Standard web page.
RIT Confidential Information in E-mail
When sending RIT Confidential information through e-mail,... ...