Information Security

Information Security (InfoSec) is protecting information and information systems from unauthorized use, modification, destruction, disruption, and any other unapproved access. It is important for all members of our campus community to be aware of recommendations, best practices, and policies when accessing University data and campus technology resources.

Information Security is not only about Information Technology (IT). In fact, only 10% of security prevention measurements are technical, which means 90% relies on the person using the computer – YOU! – following recommended safe computing practices. For example, think of the lock on the front door of your house as the 10%. You remembering to lock the lock, making sure the door is closed tightly, ensuring others do not prop open the door, keeping the keys in a safe and secure place, and so on, is the 90%. You need both parts for effective security.

  1. Managing data
  2. Securing devices
  3. Protecting your identity
  4. Minimizing threats
  5. Information Technology Policies & Committees

Managing data

Managing data is about understanding the classifications of data you access, the institutional data types, the security levels of the location where it is stored, etc.

Learn about managing data.

Securing devices

Not only do we have to safeguard desktop computers, but we also have to take steps to secure mobiles devices such as laptops, smartphones, and tablets.

Learn about improving the security of your computing devices.

Protecting your identity

Identity theft is a growing risk due to an increased interest in online banking, social networking sites, mobile downloads, online gaming, and other popular online activities. Gaining a better awareness of your level of exposure and adopting secure computing practices are steps you can take to reduce your risk to identity theft.

Learn about protecting your identity.

Minimizing threats

Any suspicious technology-related activity should be immediately reported to the HelpDesk at (765) 658-4294 or This includes suspicious emails, lost or stolen technology equipment, unauthorized access to a computer, possible computer virus, etc.

Learn about different types of suspicious activity including how you can minimize threats.

Information Technology Policies & Committees

Keeping information secure on the DePauw campus is a collaborative effort between the campus community and Information Services.

Learn more about our IT-related policies and committees.

Updated: 1/19/2016

Email This Page Email This Page Print This Page Print This Page