Security

Portable Media

Portable Media Security Standard

Portable media such as USB keys, flash memory, CDs/DVDs, etc. are a crucial part of daily business. However, portable media is easily lost or stolen and may cause a security breach.

Because portable media can be stolen or compromised easily, users should take precautions when using it to transfer or store Confidential information. We strongly discourage placing Private Information on portable media.

 

Approved Portable Media 

When handling RIT Private or Confidential information, you should use only portable media that provides an approved encryption level (the RIT Information Security... ...

Media Disposal Recommendations

Media Disposal Recommendations

... ...
Media Disposal Method

Paper

Use a shredder. Crosscut is preferred over a strip shredder. 

Disposal of paper records containing Private or Confidential  information should be accomplished by crosscut (or better) shredding, placement in a locked document destruction bin, or through vendor-supplied services under a contract approved by RIT Procurement Services.

CD, DVD, diskette, etc.

Use the media shredder (located at the ITS Service Desk, 7B-1113).

Hard Drives

If the hard drive is to

Contact Us

RIT Information Security Office

Location
Information Security Office
Ross Building 10-A201

Mailing Address
Rochester Institute of Technology
151 Lomb Memorial Drive
Ross Building 10-A201
Rochester, NY 14623-5608

E-mail infosec@rit.edu
Phone (585) 475-4122 and (585) 475-4123
Fax (585) 475-7920


Staff Directory

... ...
Name   E-mail Contact
Aldwin Maloto
Information Security Officer
abmiso@rit.edu Phone: (585) 475-6972
Office: ROS 10-A204
Jim Moore
Senior Information Security Forensic Investigator

Information Security at RIT

Since 2001, the RIT Information Security Office, in partnership with other community stakeholders, has been a leader in managing information security risk and building community resiliency through:

Confidentiality
Ensuring only those with sufficient privileges may access certain information.

Integrity
Ensuring information is whole, complete, and uncorrupted.

Availability
Ensuring access to information without interference or obstruction.


Our Mission

Provide leadership to the RIT community in safeguarding the confidentiality, integrity and availability of RIT’s information resources.

What We Do

  • Security Education, Training, and Awareness
  • Alerts/Advisories
  • Forensics/Investigations
  • Security Policies & Standards
  • Risk Management Framework
  • Structure and Resources

Risk... ...

Security Assessment Tools

The following tools should be used in combination to conduct security assessments.

Unified vulnerability management enterprise solution
 
 
Network Vulnerability Scanner
 
... ...