Real People Depend on You
- Your colleagues, customers, and other people depend on you to protect their sensitive information.
- The university depends on you to protect its good reputation and safeguard its sensitive data.
- The steps you take to protect university data also help you protect your own devices and data.
- According to university policy, you are obligated to protect sensitive university data—no matter who owns the device you are using.
Take the time to learn about and meet your responsibilities to protect sensitive university data. It's good for you, and it's good for the University of Michigan.
What Could Possibly Go Wrong?
Phones, tablets, and laptops are frequently lost, misplaced, or stolen. If your devices aren't secure, others can do everything you can on them.
- Change HR information in Wolverine Access
- Initiate and approve financial transactions
- View student records
- Access sensitive university systems
- Change settings and expose private information
- Gain access to sensitive research data
- Reply to your email
- Post to your social media
- And more
It Could Happen Here If We Don't Stay Vigilant
Criminals target universities and university account holders. Data breaches are common. Check In the News for recent articles about data breaches, IT security, and privacy.
Your Actions Have Consequences for You and the U
Meeting your responsibilities as outlined in SPG 601.33 helps the university support you if, in spite your best efforts, something goes wrong.
If you fail to meet those responsibilities, there could be serious consequences. According to SPG 601.33, "Violations of this policy may result in disciplinary action up to and including restricting the ability to use a personally owned device for work-related activities, non-reappointment, discharge, dismissal, and/or legal action."