Safe Computing Home
Information Security Requirements
Comply with U-M information security policy and supplemental standards.
Sensitive Data Guide
Decide where to safely store and share sensitive data using U-M IT services.
Upcoming Info Security Standards Session
Next session on implementing Information Security (SPG 601.27) & standards:
- 4/25. Awareness, training & education; Secure coding & app security
In the News
4/19/2019 – CNN
4/19/2019 – PC World
4/19/2019 – C|Net
Tips & Videos
Scammers impersonate tech support—through pop-ups and phone calls—and claim to know that something is wrong with your computer. Don't give them access or money.
Two-factor authentication provides additional security for your personal accounts. Use it whenever it is offered.