Security

Active@ KillDisk can completely and securely destroy all data on hard drives, removable disks, and flash media devices, without the possibility of future recovery. U-M has a license for its use by faculty, staff, and departments for U-M owned computers on all U-M campuses, including Michigan Medicine. This document provides instructions for downloading, installing, registering, and using the U-M licensed copy of Active@ KillDisk. A freeware version of Activ@ KillDisk is available for use on personally owned devices.
Several options are available in your U-M Gmail to help you reduce unwanted emails. For example, you can block mail from particular addresses, mute an email conversation, report spam, and use a filter to delete, report, or file messages automatically. Similar options are available to Michigan Medicine Exchange Outlook users. This document includes information specific to U-M Google Mail, such as Google Chrome.
If you are the target of a Freedom of Information Act (FOIA) or eDiscovery request, you may need to gather what are referred to as "responsive" messages from email—that is, email messages in response to the request. This document provides instructions for doing that in Google Mail at U-M. First, you need to find the emails, then label them, then send them as attachments.
Below is guidance for accessing RECON and Risk information in the InfoAssure.umich.edu portal. If you have any questions, please contact us through the ITS Service Center noting the question is for IA RECON, so that we can assist you!
The guidance below should be followed by anyone installing, managing, or using a webcam for U-M business, and is recommended for anyone using one for any purpose. If you use a webcam for U-M business, you need to do so in accordance with Proper Use of Security Cameras (SPG 66.01). Apply these recommended security controls for web cameras:
If you have received a Sensitive Data Discovery report indicating that potentially sensitive data has been found on your workstation or an IT system you are responsible for, you need to take appropriate action as outlined in this document.
Users of the ITS Web Hosting service may find the following tips useful in order to prevent their web applications and data from being compromised by an attacker. As your application or site is hosted on a shared server and uses a networked filesystem (AFS), a compromise of your site could also negatively affect others on campus.