- Abuse and Misuse of IT Resources (policy violations, spam, phishing, and so on)
The IT User Advocate responds to reports of misuse of U-M IT resources, online harassment, and digital copyright infringement, as well as helping interpret IT policy. - Access to University Data
The Data Stewards and their proxies can help you get access to university data; see the list of U-M Data Stewards & Managers. Your unit may request access to a current or terminated employee's U-M account in accordance with U-M policy if needed. See Access to Employee-Held Data for U-M Units. - General Security and Compliance
Information Assurance (IA) provides guidance about compliance with policies, laws, and regulations, as well as recommendations for safe computing best practices. IA also helps units prevent and respond to IT security incidents and secure IT infrastructure. Request help or submit questions to IA through the ITS Service Center. - IT Groups You Can Join
There are many online groups you can join to receive information that will help you with IT security and provide general information about the state of important IT infrastructure at U-M. - Research Information Security and Compliance
If you have a U-M research project for which the federal contract or award contains language or clauses requiring specific information security controls, you can send email to [email protected] for help. Learn about U-M's Research Information Security Program. - Security Incidents
If you suspect or experience an IT security incident, you must report it (see Report an IT Security Incident). If you are responsible for handling the response for your unit, see Responding to an IT Security Incident for instructions. - Unit-Based IT Security
Your unit's Security Unit Liaison helps you work through unit-level IT security issues and problems and coordinate with U-M Information Assurance as needed. - Need Other Help?
Contact the ITS Service Center.