Updating...
Skip to main content
(opens in a new tab)
Filter your search by category. Current category:
All
All
Knowledge Base
Service Catalog
Search the client portal
Search
Sign In
Show Applications Menu
Client Portal
Sign In
Search
Home
IT Project Management
Services
Knowledge Base
More Applications
Skip to Knowledge Base content
Search
Articles
Knowledge Base
Security
Security
Identity and access management, incident response and investigation, security policy and compliance, security consulting and education
Categories (3)
Accounts and Access
Account setup and use, passwords and access to systems.
Expand
Phishing, Malware, and Virus Security
Expand
Safeguarding Data and Devices
University employees have a legal responsibility to protect personal data for all students, faculty, and staff.
Expand
Articles (10)
Adding a user to Safe Senders list in Outlook
Instructions on how to add an email address to the Safe Senders list in Outlook Online and Outlook Desktop.
Computer and Network Security Policy
Appropriate security shall include, but is not limited to: protection of the privacy of information, protection of information against unauthorized modification or disclosure, protection of systems against denial of service, and protection of systems against unauthorized access.
Daily Office Cybersecurity and Data Protection Checklist
Keep your account safe, prevent scams, send safe email, and practice good device hygiene with the Cybersecurity Checklist.
Data Classification Questionnaire
A list of questions and examples to help Faculty and Staff classify University data.
GLBA Safeguards Rule Quick Reference
The GLBA Safeguards Rule (16 CFR 314) (“the Rule”) requires the university to develop, implement, and monitor processes aimed at ensuring the security of certain nonpublic personal information obtained when the university offers or delivers (or offers or delivers on behalf of an affiliate) a customer a financial service or product.
Higher Education Community Vendor Assessment Toolkit (HECVAT)
When purchasing third-party software or hardware, university personnel must obtain a HECVAT for the product from the vendor .
On-Premises Server Administration Responsibilities
To ensure that on-premises servers comply with enterprise standards and maintain the same level of security, operational integrity, and disaster readiness as servers migrated to Azure.
Requesting SSL Certificates
IT Services grants SSL certificates issued by Sectigo the InCommon Certificate Service. Certificates are valid for one year.
Summary of the Code of Computing Practices
This summary is compiled to make possible a quick review of the terms and provisions of the University of Arkansas' Code of Computing Practices. By using a University of Arkansas computer account, you are deemed to have agreed to comply with the Code of Computing Practices and to know its provisions.
Sending and Receiving Encrypted Email with Outlook
Students, faculty and staff sending confidential or sensitive information over email should use the Encryption feature in Outlook.
Search this category
Search
Blank
Popular Articles
Set up a new primary UARK account
Sending a File to Print in a Tech Spot Lab
UARK accounts for email and university systems
Setting up Multi-Factor Authentication (MFA) on your UARK account
UARK Account Password Requirements
Recent Articles
Use, Maintain, and Troubleshoot Your Web Browsers
SharePoint Online
Finding a Web Publishing Solution
Set up a new primary UARK account
Microsoft Outlook: Snoozing Emails
Popular Tags
Accessibility
(15)
Microsoft
(14)
software
(13)
Policy
(12)
Assignment
(10)
Student
(10)
account
(9)
blackboard
(9)
software-request
(9)
teamdynamix
(9)