Results 31-37 of 37
Access If you have been granted a Frey Access Card with currently approved access to the Data Center, you are allowed in the Data Center without signing in and out when entering the Data Center during designated times for which you have approved access. You must wear your Frey Access Card where it is visible at all times that you are inside the Data...
Article Id: 14136
Category: NOC

In order to keep an accurate accountability of mileage and fuel usage, all ITS vehicles must be...
Article Id: 6864
Category: NOC

Article Id: 5595
Category: DHCP Information

Data Classification Data at LSU can be classified into three categories (Confidential, Private or Public). Confidential data has a high level of sensitivity. Private data has a moderate level of sensitivity. Public data has a low level of sensitivity. Each category carries a different level of access and reputation risk. PS06.20...
Article Id: 14852
Category: Security and Policies

IT Policy Statements: Quick Reference NOTE: This is an abbreviated list of commonly referred to Policy Statements. This is NOT a comprehensive list. For details on ALL IT Polices & Laws,...
Article Id: 10744
Category: Security and Policies

Overview This article will explain how to enroll and download a client certificate from InCommon Cert Manager. The client certificate will be used to "Sign" and / or "Encrypt" your e-mail messages. NOTE: This article assumes you have already received a provisioning e-mail...
Article Id: 16360
Category: Security and Policies

General Information Spider is an open-source tool developed by Cornell University that can be used to discover personally identifiable information (PII) on a computer. Should a computer ever be compromised by an attacker, this information could be stolen...
Article Id: 15154
Category: Security and Policies