Disaster Recovery/Business Continuity Planning
Info and templates for IT disaster recovery planning at U-M.
ITS Suite of HIPAA Policies
ITS HIPAA policies that can be adapted for use by other U-M departments or units.
Network Printing Best Practices.
How to prevent some common networked printer issues, such as spam, denial of service attacks, and other issues that waste your time and resources.
Risk Analysis (RECON)
A risk assessment methodology used to assess threats and vulnerabilities to mission critical U-M systems and applications, or to systems storing sensitive data.
Securely Dispose of Media
Information about the responsibility of university departments to securely dispose of or destroy any media that has ever held, stored, or transmitted sensitive university data.
Security Vulnerability Communication Process
U-M's security triage process for determining how urgent an incident is, and communicating that level of urgency to you.
Vendor Security and Compliance Assessment
A guide for reviewing external service providers that access, maintain, or process sensitive institutional data.
Additional IT security resources at U-M that are available to you and your unit.