In the Education, User Awareness, & Consulting service, the LSA IT Infrastructure group provides documentation, face-to-face consultation, and training regarding safe computing and data protection. This includes initiatives to educate faculty and staff through University and LSA-specific IT security policies and standards, best practices for handling institutional data, security-related advisories, and technical how-tos. We also address concerns brought forward by departments or individuals and encourage discussion around information security related issues. Ultimately, the goal of these efforts is to provide sound information security training to empower faculty and staff with the knowledge to appropriately protect information assets, safeguard the integrity of institutional processes, and ensure compliance with state and federal regulations.
LSA Additional Restrictions for Using University Data on Personal Devices
A new university policy permits U-M staff to use their properly managed and secured personally owned devices to access sensitive university data when necessary in the course of their work. The College of Literature, Science, and the Arts will follow the policy and its supporting guidance with additional restrictions.
Follow the links below to review what is expected of you, and to learn how to help minimize the risk to university data as well as your own personal information.
- VIDEO: Secure Your Devices: For You and the U
- Security of Personally Owned Devices That Access or Maintain Sensitive Institutional Data (SPG 601.33)
- LSA Additional Restrictions for Using University Data on Personal Devices
- University Data and Personally Owned Devices
- Instructions for Securing Your Devices and Data
- Sensitive University Data
- Safe Computing website
Data Profile Tool
In order to help faculty and researchers achieve safe handling and storage of research and scholarly materials, LSA has created a tool to help you determine the sensitivity of your work and protection measures that should be in place to secure sensitive information. Receive up-to-date information information on security, legal compliance, training resources, and solutions tailored for the data type you are working with by completing a profile on LSA's Data Profile Tool (requires authentication).
- General LSA IT Security Information and History
- LSA Joint IT Research Committee Data Management Plan
- LSA.Security's Standard Operating Procedure
- University of Michigan IT Security Links
- Administrative Services
- ArcGIS for Server
- Desktop Support
- Field IT Equipment Evaluation and Demonstration Program
- File Storage
- Hard Drive Shredding
- High Performance Computing
- Lab Consulting & Design Request
- Network Consulting
- Other (Non-LSA) IT Services
- Password Reset
- Poster Printing
- Programming & Applications
- Research Support
- Server and Service Monitoring
- Web Hosting