Updating...
Skip to main content
Filter your search by category. Current category:
All
All
Knowledge Base
Service Catalog
Search the client portal
Search
Sign In
Show Applications Menu
Client Portal
Sign In
Search
Home
IT Project Management
Services
Knowledge Base
More Applications
Skip to Knowledge Base content
Search
Articles
Knowledge Base
Security
Security
Identity and access management, incident response and investigation, security policy and compliance, security consulting and education
Categories (3)
Accounts and Access
Account setup and use, passwords and access to systems.
Expand
Phishing, Malware, and Virus Security
Expand
Safeguarding Data and Devices
University employees have a legal responsibility to protect personal data for all students, faculty, and staff.
Expand
Articles (8)
Computer and Network Security Policy
Appropriate security shall include, but is not limited to: protection of the privacy of information, protection of information against unauthorized modification or disclosure, protection of systems against denial of service, and protection of systems against unauthorized access.
Daily Office Cybersecurity and Data Protection Checklist
Keep your account safe, prevent scams, send safe email, and practice good device hygiene with the Cybersecurity Checklist.
Higher Education Community Vendor Assessment Toolkit (HECVAT)
When purchasing third-party software or hardware, university personnel must obtain a HECVAT for the product from the vendor .
On-Premises Server Administration Responsibilities
To ensure that on-premises servers comply with enterprise standards and maintain the same level of security, operational integrity, and disaster readiness as servers migrated to Azure.
Requesting SSL Certificates
IT Services grants SSL certificates issued by Sectigo the InCommon Certificate Service. Certificates are valid for one year.
Summary of the Code of Computing Practices
This summary is compiled to make possible a quick review of the terms and provisions of the University of Arkansas' Code of Computing Practices. By using a University of Arkansas computer account, you are deemed to have agreed to comply with the Code of Computing Practices and to know its provisions.
Sending and Receiving Encrypted Email
Students, faculty and staff sending confidential or sensitive information over email should use the Encryption feature in Outlook.
GLBA Safeguards Rule Quick Reference
The GLBA Safeguards Rule (16 CFR 314) (“the Rule”) requires the university to develop, implement, and monitor processes aimed at ensuring the security of certain nonpublic personal information obtained when the university offers or delivers (or offers or delivers on behalf of an affiliate) a customer a financial service or product.
Search this category
Search
Blank
Popular Articles
New Account Setup
Getting Started with Microsoft Teams
Using GlobalProtect VPN for Off-Campus Network Access
Leaving the University and UARK Account Expiration
Using Box Cloud Storage
Recent Articles
Using the University’s UARK Wi-Fi
UARK WordPress
Web Forms with Jadu
Finding a Web Publishing Solution
Leaving the University and UARK Account Expiration
Popular Tags
Policy
(12)
Assignment
(10)
Student
(9)
teamdynamix
(9)
blackboard
(8)
Kaltura
(8)
IT
(7)
video
(6)
Accessibility
(5)
howto
(5)