Information Technology Security
- Security ALERT - New Malware - “Cryptolocker Ransomware”
PREVENTION: Do not open email attachments from senders you do not know or attachment you do not understand as to why they were sent to you. If you own personal devices make sure the anti-virus software is up to date.
A particularly nasty phishing scheme is making it way around the US and the world and hooking unsuspecting users and downloading and executing malware on your computer that restricts access to your computer files and gives you 72 hours (typically) to pay a ransom to get access back to your computer files, etc.
The IT dept. is doing everything it can to keep it from getting to your inbox and your computer, but you are the last line of defense. Remember security is everyone’s business.
IF YOU GET INFECTED: If you get the following screen on your computer, shut it down and disconnect it from the network immediately and call the IT Helpdesk (ext. 4357).
For more on (1) what to look for, (2) how to prevent, and (3) what to do if you get infected refer to the detailed information.
- Online Security Management Training
The online security training video will emphasize the importance of protecting sensitive data in your daily work routine and is also a review of the proper use of the College computing infrastructure. The training will take approximately 20 minutes.
- Training Video - After you have finished viewing the video, be sure to complete the "COD Security Management Training Acknowledgement" form to record your participation.
- Please contact the Teaching and Learning Center (TLC@cod.edu or ext. 3805) or the IT Helpdesk (firstname.lastname@example.org or ext. 4357) with any questions.
- “Phishing” Scam - Like fishing, these increasingly sophisticated scams try to “hook”
you so that the scammers can “reel-in” your personal/private information. Read more
- Electronic Mail and Electronic Communications Guidelines
A guide for users of the College Electronic Communications Infrastructure
- SUMMARY of Electronic Mail and Electronic Communications Guidelines
A summary of the guide for users of the College Electronic Communications Infrastructure
- Privacy of Student, Faculty, Staff, and Alumni Nonpublic Information
Standards for Safeguarding Customer Information (The Gramm-Leach-Bliley Act) - A guide for College Employees
- The College of DuPage Higher Education Opportunity Act (HEOA) Compliance Plan for
Combating Unauthorized Distribution of Copyrighted Materials
The Higher Education Opportunity Act (HEOA) was signed into law on August 14, 2008. Final regulations were issued on October 29, 2009. Enforcement of the HEOA provisions formally begins July 1, 2010, and all colleges and universities are required to make a good-faith effort at compliance.
PCI Incident Response Plan:
The purpose of the Payment Card Industry (PCI) Incident Response Plan (“The Plan”) is to provide a well-defined, organized approach for handling any potential unauthorized access/breach of personal information, specifically credit card information from the supporting credit card payment system(s) here at College of DuPage (COD). The Plan identifies and describes the roles and responsibilities of the Incident Response Team. The Plan also contains instruction on how the team is to prepare and how The Plan is to be maintained. Also included in The Plan is the contact information for every team member and other important personnel here at the college. The Incident Response Team, under the coordination of the Chief Security Officer, IT, is responsible for putting the plan into action. Copies of the PCI Incident Response Plan are CONFIDENTIAL. Copies can be obtained by college staff, with the need to know, by contacting Keith Conlee, email@example.com, x3055.
College-Wide Sensitive Data Incident Response Plan:
The purpose of the College-Wide Sensitive Data Incident Response Plan (“The Plan”) is to provide a well-defined, organized approach for handling any potential unauthorized access/breach of sensitive data here at College of DuPage (COD). The Plan identifies and describes the roles and responsibilities of the Incident Response Team. The Plan also contains instruction on how the team is to prepare and how The Plan is to be maintained. Also included in The Plan is the contact information for every team member and other important personnel here at the college. The College-Wide Sensitive Data Incident Response Team, under the coordination of the Chief Security Officer, IT, is responsible for putting the plan into action. Copies of the College-Wide Sensitive Data Incident Response Plan are CONFIDENTIAL. Copies can be obtained by college staff, with the need to know, by contacting Keith Conlee, firstname.lastname@example.org, x3055.
COD MS Outlook Email Distribution Group Assignment Procedure
An MS Outlook email ID is assigned to a default set of email distribution groups when it is created. After creation your email ID may be assigned to other existing email distribution groups depending on your job category and/or job function. If needed, a new email distribution group may be requested. The email distribution group assignment procedure documents how the college assigns email IDs to existing email distribution groups, and how to request the creation or deletion of an email distribution group.
How do I?
For more information about College Guidelines, Federal Regulations, and Industry Standards that the college and college staff must conform to, please refer to the following references. The college must comply with these guidelines, regulations, and standards, or face liabilities including but not limited to fines, and lost service capability. The IT Security Management function is responsible for making sure compliance is met which includes technical compliance, and staff training, awareness, and compliance demonstration.
FERPA (Family Educational Rights and Protection Act):
- Requires protection of education records
PCI DSS (Payment Card Industry Data Security Standard):
- Requires the protection for all credit card information and transactions.
GLBA (Gramm-Leach-Bliley Act):
- Requires protection of financial information
FTC - Summary:
FTC - The Act:
HIPAA (Health Insurance Portability and Accountability Act):
- Requires the protection of individually identifiable health information
CALEA (Communications Assistance for Law Enforcement Act):
- Requires electronic communication providers to provide easy access for law enforcement agencies to electronic communications for the purpose of electronic surveillance.
HEOA (Higher Education Opportunity Act):
- Among other things outside IT requires the monitoring and stopping of illegal P2P file sharing
Hours for Fall and Spring Semesters*
Monday to Friday: 7:30 a.m. to 10 p.m.
Saturday: 8 a.m. to 5 p.m.
Sunday: 11 a.m. to 8 p.m.
*Please note the hours may differ on holidays or when classes are not in session. Please contact the department for operating hours during these times.
2014 College of DuPage