Identity Finder and PIMI Quick Links
- Faculty and Staff Responsibilities
- Private Information Handling Table
- Private Information Management FAQ
- End User Identity Finder Guide for Windows (updated May 5, 2011)
- End User Identity Finder Guide for Mac (updated December 16, 2011)
- Mac Quick Reference (updated February 14, 2012)
- End User Identity Finder software demo (requires Adobe Flash)
- Management and Technical Representatives
- Administrator resources may be found on the RIT Information Security wiki (Restricted Access)
Requirements for Students
- Read and understand the RIT Code of Conduct for Computer and Network Use and the RIT policy regarding Digital Copyright.
- Make sure you understand and comply with all applicable standards.
When does it apply?
Always - All authentic RIT communications should include an appropriate signature as per the standard. Make it a habit to check for an authentic signature when receiving messages from RIT.
If you have a web page at RIT, official or unofficial, and you:
If the affected computer or device:
If you own or manage a device that:
If you are storing Private or Confidential information on portable media, such as USB keys, CDs, DVDs, and flash memory.
- Currently, personal networking devices used on the RIT residential network (such as routers, switches, etc.) do not need to meet the Network Security Standard. Resnet has created separate guidelines for Using a Router/Wireless Router on the RIT Network.
- Visit our Keeping Safe section to find security resources and safe practices and to see our schedule of upcoming workshops.
- Find out more about how information security affects you by becoming a Fan of the RIT Information Security Facebook page.
- Follow us on Twitter for updates on current threats.
If you have questions or feedback about specific information security requirements, please contact us.
This section of the website contains links to tools and documentation specifically for use by administrators. Scroll to the bottom of the page to access these resources.
What are my responsibilities as an administrator?
You are responsible for ensuring that all web resources, computers, servers, network devices, and any other types of computing devices that you support comply with all published standards.
You are also responsible for prompt reporting of computer incidents to the ISO in accordance with the Computer Incident Handling Standard.
Computer Incident Handling Resources
- Desktop Security Checklist
- Server Security Checklist
- Network Security Checklist
- Web Security Checklist
The Information Security Office has provided a method for obtaining an exception to compliance with the published security standards.
If you have any questions or feedback about specific information security requirements, please e-mail us at email@example.com.