Safe Computing Home
Information Security Requirements
Comply with U-M information security policy and supplemental standards.
Sensitive Data Guide
Decide where to safely store and share sensitive data using U-M IT services.
Upcoming Info Security Standards Session
Next session on implementing Information Security (SPG 601.27) & standards:
- May 23. Encryption; Network Security
In the News
Tips & Videos
Scammers impersonate tech support—through pop-ups and phone calls—and claim to know that something is wrong with your computer. Don't give them access or money.
Two-factor authentication provides additional security for your personal accounts. Use it whenever it is offered.