UC IT Security

In this age of electronic intrusion and theft, the University must protect its intellectual and administrative electronic information. Each individual and each organizational unit plays an important role in safeguarding University information resources. Follow these links for information about securing the electronic environment.

Responsibilities

Everyone at UC is responsible for IT security.

Information Security Program

Every UC campus must have an IT security program.

Management Guide for Information Security

Strategies to secure the electronic environment

Resources and Tools

Incident handling, assessment process, training, log management, agreement templates, etc.

Policies

UC information security and other IT policies

Campus/UCOP Programs

Visit location specific security programs.