It is vital that each member of the Lehigh Community take part in safeguarding our information resources and systems through compliance with Information Security policies, procedures, and guidelines. We encourage you to become familiar with the information and resources provided.
- Advisory Council for Information Services (ACIS) Policies
- Understanding Classification of Data
- Guide for Evaluating Service and Security of Cloud Service Providers
- Copyright Compliance
- Accounts and Passwords.
- Additional Security & Compliance Training Resources
- Completely Erasing a Hard Drive
- Guide for Evaluating Service & Security of Cloud Service Providers
- Information Security: FERPA
- Information Security: Whole Disk Encryption
- Overpayment Scams and Internet Fraud
- Securing the Human E-Security Training
- Securing your Printer
- Understanding Data Classification
- Using MalwareBytes Anti-Malware Software
-
Antivirus, Malware Protection, and Phishing (LTS Knowledge Base)
-
Dangerous Websites (LTS Knowledge Base)
-
Google for Education Privacy Settings (LTS Knowledge Base)
-
Lehigh G Suite: Best practices for data security (LTS Knowledge Base)
-
Network Security Policies (LTS Knowledge Base)
-
Two-factor Authentication with Duo - FAQ (LTS Knowledge Base)
-
Web page warning or restricton (LTS Knowledge Base)
-
What's in a Link: Decoding a URL (LTS Knowledge Base)
Overview
Content Tools