Information Security

Description

The Ohio University Information Security Office strives to educate and empower the University community to appropriately manage risks and protect OHIO’s information and systems. This effort is facilitated through policies, standards, an information security risk management program, as well as other tools and guidance that are provided to the University community. This modern approach creates a safe computing environment in which the University community can teach, learn, and conduct research. 

Access

How to request services

  • To report an information security incident, call 740-566-SAFE or email security@ohio.edu .

Features

The Information Security team provides a variety of features and services to the University community:

  • Incident Response  - Advise on incident response process to minimize the threat of damage resulting from unauthorized disclosure of University data, in addition to notifying proper authorities when confidential data is involved.

  • Forensics and investigations  - Forensic and investigation services at the request of specific University departments that have investigative authority.

  • Risk assessments  - Security risk assessments based on established frameworks and best practices to help departments identify risks and reduce them to an acceptable level.

  • Vendor security review  - Assessment of technology solutions to identify risks associated with the vendor, technology, or how it will be used.

  • Consulting  - Advise departments on the implementation of security best practices and controls to protect information technology assets.

  • Training and awareness - Structured educational training and awareness tailored to OHIO faculty, staff, and student employees.

    • IT Security Workshop  - In-person training sessions provide a better general understanding of information security best practices, data protection, and regulatory requirements.

    • Online IT Security Training  - Online, self-paced training consisting of short videos and accompanying quizzes.

  • Monitoring  - Real-time network threat detection by analyzing University-owned networks and systems.

  • Information security policies and practices  - Develop University policies and standards to continuously protect and secure the institution's data and information resources, as well as comply with and maintain legal and contractual requirements.

Additional resources

IT governance

Service support

Get help

  • Visit the Technology Help Center ( help.ohio.edu ) to get live support, view outages, and browse trainings.

Accessibility

Ohio University strives to make its digital resources and services accessible to all visitors, including those with disabilities who may also be using assistive technology. If special steps are necessary in order to improve the accessibility of experiences for end-users, those steps must be taken. 

If you experience a barrier that affects your ability to access OHIO websites, videos, online forums, documents, or other information technology, please let us know
For further information about OHIO's digital accessibility resources, see: