Forms, Checklists, and Templates
Many forms and checklists below are provided as Adobe PDF Fill-in forms and can be filled in and printed from Acrobat Reader.
To request an exception from an RIT Security Standard (PDF Fill-In form)
Optional NDA used at
Social networks are great. They do present some security challenges and risks, however.
This guide describes the dangers you face as a user of these websites, and provides tips on the safe use of social networking and blogging services.
Dangers of Social Networking
Many computer criminals uses these sites to distribute viruses and malware, to find private information people have posted publicly, and to find targets for phishing/social engineering schemes. Below is a short list of users who may be using... ...
Requirements for Faculty and Staff
- Read and understand the RIT Code of Conduct for Computer and Network Use and the RIT policy regarding Digital Copyright.
- In addition to compliance with all standards and policies, administrators should refer to the Resources section for implementation configurations, guidelines, and best practices.
Make sure you understand and comply with all applicable standards.
|Standard||When does it apply?|
|Desktop and Portable Computer Standard||Always|
|Information Access & Protection Standard||Always|
Everyone connected to the Internet is a potential target. Use of anti-virus and firewall software is critical in protecting your computer online; however, simply protecting your computer is not enough.
Cyber criminals often target vulnerabilities in web browsers. Because Internet Explorer was a web browser used by most people, it quickly became a primary target. Using a different browser can reduce your risk while on the web. The table below lists alternative browsers: