Frequently Asked Questions
- Does the University have Information Security policies? Where are they?
- What is HIPAA?
- Who is my IT Partner?
- What is computer security?
- What is the difference between information security and computer security?
- Why have good passwords?
- What is a good password?
- What is a virus?
- What can I do to keep from getting a virus?
- What is hacking?
- Do I have a virus?
- My computer is acting up. Do I have a virus?
- What are virus hoaxes?
- Why do I have to worry about information security?
- What anti-virus software is available?
- How do I install anti-virus software?
- Why should I update my anti-virus software?
- Does the University monitor my Internet usage?
- Does the University read my email?
- What about file sharing utilities?
- What are my options if I want to save or share files on the cloud?
- Why shouldn’t I download music and video onto my work computer?
- Can I download games or utilities to my work computer?
- What are the differences between the different *wares (shareware, freeware, etc.)?
- How can I protect my data when I travel outside the U.S.?
Does the university have information security policies? Where are they?
Yes, UT Health San Antonio currently has 29 information security policies. These policies can be found in section 5.8 of the Handbook of Operating Procedures (HOP). Information security and assurance also works closely with many other departments on information security-related topics, incidents and activities. For this reason, the Information Security and Assurance department has collected the HOP entries related to Information Security on to one page.
What is HIPAA?
HIPAA is the Health Insurance Portability and Accountability Act of 1996, also know as Public Law 104-191. It has three parts: transaction code sets, privacy and security. The Information Security and Assurance department works with the privacy rule as well as with the Office of Regulatory Affairs and Compliance, who has responsibility for the privacy rule. The security rules state that sensitive patient data, also referred to as electronic protected health information (ePHI), must be protected in all forms while being stored (e.g., on servers), while being moved (e.g., on CDs or portable media), or while being transmitted (e.g., in email or other electronic data transfers).
Who is my IT Partner?
Your IT Partner is NOT your first line of defense for computer-related problems, it is best to contact the Customer Service Desk at 210-567-7777 first for hardware, software and information security. If the Customer Service Desk does not meet your needs or if you are not sure who to contact about an IT need contact your IT Partner. These individuals will put you in contact with the IT resources responsible for your need. You can find your IT Partner listed in the IT Partner Directory on the UTConnect SharePoint page. If your department is not on the list, contact the Customer Service Desk at 210-567-7777 or at 7-7777 on campus and they will help locate your IT Partner.
What is computer security?
Computer security is the set of technological and managerial procedures applied to computer systems to ensure the availability, integrity and confidentiality of information managed by the computer system. It is often synonymous with information security, but is really a subset.
What is the difference between information security and computer security?
While computer security deals with the processes applied to computer systems, information security concerns all of the aspects regarding the system of policies and/or procedures for identifying, controlling and protecting information from unauthorized disclosure. While often synonymous, information security is actually a superset of computer security, encompassing the fields of data security, transmission security, network security, physical security, personal security and personnel security, among others.
Why have good passwords?
The combination of your username and password uniquely identifies you to the UT Health San Antonio network. They are required to log on to your computer, access your email, visit certain university web sites and other University resources and all network activity is routed with them. A good, strong password keeps anyone else from logging on to the network with your username and impersonating you. If someone else accesses the network with your credentials, any harm, misuse, abuse and/or impropriety of the network or university email will link back to you, not the intruder. Remember to pick a good password and protect it. Never share it with anyone.
What is a good password?
Most simply put, a good password is easy for the user to remember but extremely difficult for an intruder to guess. As a general rule, the longer the password, the better and passwords that are both long and more complex are the safest option. Making a password complex involves combining both upper and lowercase letters, numbers and special characters in such a way that the user can easily remember it. Pick passwords that are obscure (your mother-in-law’s maiden name and birthday) or acronyms (Wdwgfh? = Where do we go from here?) or parts of words (GeoCatJoh3! = the first three letters of George, Cathy and John, along with something extra at the end), but never anything from the dictionary (local or foreign) or popular culture. Currently, the university requires all passwords to be at least eight characters in length and they must include at least three of the following: upper case letters, lower case letters, special characters and numbers.
What is a virus?
A virus is a program or piece of code that is loaded onto a computer without the user’s knowledge and runs against the user’s wishes. Most viruses can also replicate themselves and, in many cases, redistribute themselves. Virus activity can be as simple and benign as a prank, or so destructive that valuable data is lost. Viruses, or malware, can be distributed by hard media, by accessing maliciously configured web pages, across network shares or through attachments in electronic mail.
What can I do to keep from getting a virus?
The single most important tool for preventing computer virus infection is awareness. Users should always maintain knowledge surrounding the