Information Technology Security Group
New Information Systems Security Plans
A Security Plan is required, per UT Systems IT Policy IT0121, for computer systems at the UTHSC. This new policy became effective January 1, 2010; the initial security plans are to be done by January 1, 2011. See this page for complete information and instructions.
Secure Server Initiative
The Secure Server Initiative is focused on identifying, classifying and protecting UTHSC servers.
Two tools are available. an Excel tool that captures and classifies the system You must have macros enabled in Excel for Windows. For Macintosh users, use this version that does not have macros enabled.
The second tool is a spreadsheet to accumulate multiple systems .
System custodians must submit required data about each server using the tools above Security@uthsc.edu.
Help Secure Campus Computing
Welcome to the University of Tennessee Health Science Center's resource for information technology security. The Information Technology Security Group (ITSG) is charged with the responsibility of network and systems security at the UTHSC.
The ITSG works with members of the UTHSC community, including system administrators, students, staff and faculty, to protect the UT network and connected hosts. The ITSG cooperates with administrators at other sites, as well as law enforcement entities, in response to security incidents.
Security threats come in a variety of forms, but the end result is the same: a serious disruption to our work. Compounding the security weaknesses of the Internet is the widespread availability of “hacker-helper” programs on the Internet. Today, talented hackers are writing extremely powerful hacking tools and making them available for download on the Internet. No longer must the attacker be an expert or understand the nuances of the target’s vulnerabilities, all they need to do is point the tool at the target and hit the “Attack” button.
This ability of attackers to use readily available software has attracted the criminal element who uses that software for identity theft. These criminals also use fake e-mails and fake websites to attract victims.
Do Your Part, Know Your Responsibilities
- Acceptable Use Policy (IT0110) - (select)'Policies and Procedures'
- Complete Your HIPAA Security Training
- Use Safe Computing Practices
Secure Skype Usage
Don't be a victim of fraud, identity theft or cyber crime.
IT Security Group
877 Madison Ave
Memphis, Tennessee 38163
Confidential Compliance Hotline: