Safe Computing Home
Information Security Requirements
Comply with U-M information security policy and supplemental standards.
Sensitive Data Guide
Decide where to safely store and share sensitive data using U-M IT services.
Materials from Security Standards Sessions
Working sessions on implementing Information Security (SPG 601.27) & standards have finished. Slides, recordings, and Q&A reports are available at SPG 601.27 Implementation Presentations.
In the News
7/15/2019 – Bloomberg
7/15/2019 – Inside Higher Ed
7/15/2019 – AP News
Tips & Videos
Scammers impersonate tech support—through pop-ups and phone calls—and claim to know that something is wrong with your computer. Don't give them access or money.
Two-factor authentication provides additional security for your personal accounts. Use it whenever it is offered.