To protect the RIT community and the Institute network from computer-borne threats, RIT has created minimum security requirements for desktop and laptop computers.
Desktop and Portable Computer Standard
Current Desktop/Portable Computer Standard (updated 2020)
What does it apply to?
- All RIT-owned or leased computers.
- Any computer (physical or virtual) connecting to the RIT network through a physical, wireless, dial-up, or VPN connection.
The standard is not required for:
The following devices should employ these controls to the extent possible commensurate with the risk of the information that is accessed or stored on them.
- Computers used only to access RIT web pages, Webmail, etc. from off campus. (RIT strongly recommends that users follow the requirements of the standard on all computers.)
- Mobile devices (tablets, cell phones), pagers, PDAs, copiers and other special purpose devices that connect to the Institute network solely through Web, portal, or application access.
Storage of Private information is prohibited on these devices.
What do I need to do?
- The Desktop and Portable Computer Checklist: General User is the quickest way to check if you comply with the security requirements.
- The Desktop and Portable Computer Checklist ITS-Supported Users is designed for users whose department is supported by ITS.
- A Desktop and Portable Computer Checklist: Systems Support is available systems support personnel to ensure supported users comply with the standard.
- Use our Securing your Computer page to find the required software and supporting documentation for the Desktop Standard.