COVID-19: UB Planning and Response • Updated 7/2/2020
Compromised hosts may not be disturbing the network or fall into any of the other categories. Possible attributes are:
Contact the UBIT Help Center.
Copyright guarantees rights to owner of a work, including commercial gain, but copyright works can be used under Fair Use.
Transport Layer Security (TLS) protocol allows applications to communicate across a network in a way designed to prevent eavesdropping and tampering.
Many of us deal with restricted data every day as part of our job. We each have a responsibility to safe guard restricted data against unauthorized disclosure.
The "Health Insurance Portability and Accountability Act of 1996" (HIPAA) provides protection of our medical information. UB needs to be aware of how HIPAA affects the information we handle.
Since 2005, UB has tracked and classified information security incidents. Information sharing and partnerships help better secure UB's infrastructure.
Mozilla Firefox offers a more secure Internet browsing experience.