If you use a personally-owned computer for U-M work, or you manage a university-owned computer, then you are responsible for properly securing it in accordance with university policy (see below). If you use a university or departmentally managed computer, such as a MiWorkspace computer or Michigan Medicine CoreImage computer, then your security settings are managed for you.
Refer to the Sensitive Data Guide entry for Personally Owned Devices to determine which U-M data is permitted or prohibited from personal devices.
Regardless of the presence of sensitive U-M data, your computer may contain personal and private information, such as financial or medical information, notes, photos, contacts, documents, or saved passwords, that you wish to protect from theft or accidental loss.
Michigan Medicine Note: All devices connecting to the UMHS-8021X wireless network must be CoreImage or enrolled in Intelligent Hub. MWireless is available to members of the Michigan Medicine community, but it does not allow access to Michigan Medicine resources.
Instructions for Your Operating System
General Best Practices
- Keep your operating system and other software up-to-date. Software updates include patches for newly identified vulnerabilities and other important security updates.
- Back up your data. Hard drives wear out. Devices can be lost or stolen. The university offers several file storage options (both free and fee-based) that you can use. Check the Sensitive Data Guide to see which services are appropriate for certain types of sensitive institutional data. U-M data must be backed up to a U-M device or service.
- Choose web browser security settings that protect your privacy and enhance security.
- Put a sticker on your computer with your name and contact information so somebody who finds your lost computer can reach you.
- Register your devices. The U-M Police Department offers a free laptop and personal electronics registration program to members of the U-M community.
- Travel safely with technology. Protect your privacy and the university's sensitive data when you're away from home.
- Use antivirus software. Follow the guidance for Anti-virus for Personal Computers to protect a personally-owned computer.
You are responsible for complying with the policies and standards below. The requirements on this page help you meet that responsibility.
- Responsible Use of Information Resources (SPG 601.07)
- Security of Personally Owned Devices that Access or Maintain Sensitive Institutional Data (SPG 601.33)
- Unit-Specific Requirements for Self-Management of Personally Owned Devices that Access Sensitive Institutional Data (DS-07)
- Tech Tools: Cell Phones and Portable Electronic Resources (SPG 514.04)