Information Security: Policies, Procedures and Guidelines
It is vital that each member of the Lehigh Community take part in safeguarding our information resources and systems through compliance with Information Security policies, procedures, and guidelines. We encourage you to become familiar with the information and resources provided.
- Advisory Council for Information Services (ACIS) Policies
- Understanding Classification of Data
- Guide for Evaluating Service and Security of Cloud Service Providers
- Copyright Compliance
- Accounts and Passwords.
- Additional Security & Compliance Training Resources
- Completely Erasing a Hard Drive
- Guide for Evaluating Service & Security of Cloud Service Providers
- Information Security: FERPA
- Information Security: Whole Disk Encryption
- Overpayment Scams and Internet Fraud
- Securing the Human E-Security Training
- Securing your Printer
- Understanding Data Classification
- Using MalwareBytes Anti-Malware Software
-
Antivirus, Malware Protection, and Phishing (LTS Knowledge Base)
-
Dangerous Websites (LTS Knowledge Base)
-
FAQ - Two-factor Authentication with Duo (LTS Knowledge Base)
-
Google for Education Privacy Settings (LTS Knowledge Base)
-
Lehigh G Suite: Best practices for data security (LTS Knowledge Base)
-
Network Security Policies (LTS Knowledge Base)
-
Web page warning or restricton (LTS Knowledge Base)
-
What's in a Link: Decoding a URL (LTS Knowledge Base)
For immediate help, contact the LTS Help Desk (Hours)
EWFM Library | Call: 610-758-4357 (8-HELP) | Text: 610-616-5910 | Chat | helpdesk@lehigh.edu
Submit a help request (login required)