• SHU Tech Help
Information Technology

Information Security

In the digital age where we have access to so much data and information, it can become difficult to distinguish between what information is accurate, which sites are secure and what information is legal to use. As the digital age continues to unfold, so does the need for regulation and guidelines on appropriate use.

At Seton Hall, we know the importance of providing a secure network where employees and students can feel safe in utilizing the network in pursuit of their academic goals.  To this end, we have implemented network safeguards such utilities to manage network traffic and required password resets.  We have also provided the information below as a reference for what you can do to keep your data and identity secure as well as ways to safeguard yourself from copyright infringement.

Keeping your Data Secure
E-mail, chatting and surfing the net has become such an integral part of our everyday life that we barely bat an eye when asked to create an account, enter credit card information, or some other piece of personal information about ourselves.  We chat on-line, sign up for list serves, blog etc. But in the process, are we opening ourselves to problems such as identity theft?  Learn what you can do to safeguard your equipment and data from cyber-attacks »

Sharing Data Responsibly
We all walk around with cell phones, I-pods, and other devices that we use to play music and games, watch movies and television shows.  With the ease of the Internet, music, movies,  and games are all right at our finger tips.  More and more people are turning to the Internet and streaming media rather that renting a movie or buying a CD or DVD. The question is, how can you tell which sites are legal? When does downloading a song become a copyright infringement? Find out what you need to know to act responsibly »

Compliance with the Digital Millennium Copyright Act
Seton Hall is taking steps to ensure that members of the Seton Hall community comply with the Digital Millennium Copyright Act.  An agent has been established through the Office of Compliance and Risk Management to investigate reports of copyright infringement.  Learn more about what you can do if you suspect an infringement »

Why is Security Awareness Important?
To protect the confidentiality, integrity, and availability of information in today's highly networked systems environment requires that all individuals:

  • understand their roles and responsibilities related to the organizational mission;
  • understand the organization's information technology security policy, procedures, and practices;
  • have at least adequate knowledge of the various management, operational, and technical controls required and available to protect the IT resources for which you are responsible.

 

Contact Us

Department of Information Technology
(973) 275-2222
servicedesk@shu.edu
Corrigan Hall

Sign In to PirateNet