Help U-M to ensure the confidentiality, integrity, and availability of its critical information assets and data.
Comply With Laws, Policies & RegulationsApply the laws, regulations, and policies that require security safeguards around sensitive institutional data.
Manage U-M WorkstationsGet techniques for securing the devices you work with.
Protect Your Unit's ITHelp for meeting the requirements of the U-M information security policy and standards and for protecting the privacy and security of institutional and personal data.
Safely Use Sensitive DataClassify U-M data by sensitivity level and take appropriate steps to protect sensitive data regardless of type of device or where it is stored.
Protect Research DataThe Research IT Security toolkit provides resources to help U-M researchers navigate IT security compliance and ensure their research data is appropriately protected.
Use Two-Factor Authentication (Duo)U-M uses Duo two-factor authentication for login security to protect the university and you.