It is vital that each member of the Lehigh Community take part in safeguarding our information resources and systems through compliance with Information Security policies, procedures, and guidelines. We encourage you to become familiar with the information and resources provided.
- Advisory Council for Information Services (ACIS) Policies
- Understanding Classification of Data
- Guide for Evaluating Service and Security of Cloud Service Providers
- Copyright Compliance
-
Antivirus, Malware Protection, and Phishing (LTS Knowledge Base)
-
Dangerous Websites (LTS Knowledge Base)
-
FAQ - Two-factor Authentication with Duo (LTS Knowledge Base)
-
Google for Education Privacy Settings (LTS Knowledge Base)
-
Lehigh G Suite: Best practices for data security (LTS Knowledge Base)
-
Network Security Policies (LTS Knowledge Base)
-
Web page warning or restricton (LTS Knowledge Base)
-
What's in a Link: Decoding a URL (LTS Knowledge Base)