Tip of the Week
Own your Online Presence. Check your security and privacy settings on websites. Only share your information with those you are comfortable with.
Find the latest scams, schemes and ways that cyber hackers are trying to get your information. Learn the latest vulnerabilities affecting different operating systems.
Information Technology strives to increase the awareness throughout the USF community. Find the tools to help make your computer and server safer.
Find other resources and tips with the following links.
Copyright Information & DMCA
If you download from a P2P website through the USF campus network, your internet connection will be disabled and you will receive an email from the Incident Response Team regarding USF Network Terms of Service.
Policies, Procedures, & Standards
USF has several technology policies, procedures, and standards to guide colleges and departments with their technology decisions.
IAMUSF is a USF program that is designed to establish a trusted, global identification system that includes the entire USF community: students, alumni, faculty, staff, vendors, guests, and contractors.
Collection of SSN
Florida law provides that public agencies, including USF, must notify individuals of the circumstances that would require the collection and use of social security numbers. Florida Statute 119.071(5) specifically authorizes USF to collect SSN’s when it is imperative in the performance of its duties. The following are the general scenarios under which USF will collect and use social security numbers:
The Gramm-Leach-Bliley Act (GLB or Act) requires “financial institutions” to protect the privacy of their customers, including customers’ nonpublic, personal information. Because universities also deal with a variety of financial records from students and their parents, the University of South Florida has a responsibility to secure the personal records of its students.
The potential increase in the number of security-related incidents on campus as well as state-wide data security audits has resulted in the need for centralization and coordination of security efforts and implementation of a security structure campus-wide to facilitate the dissemination of information and identification of appropriate personnel in each computing department to address security threats quickly and efficiently. The following outline