Skip to Content
Department of Information Technology
computer keyboard

Information Security

In the digital age where we have access to so much data and information, it can become difficult to distinguish between what information is accurate, which sites are secure and what information is legal to use. As the digital age continues to unfold, so does the need for regulation and guidelines on appropriate use.

At Seton Hall, we know the importance of providing a secure network where employees and students can feel safe in utilizing the network in pursuit of their academic goals. To this end, we have implemented network safeguards such utilities to manage network traffic and required password resets. We have also provided the information below as a reference for what you can do to keep your data and identity secure as well as ways to safeguard yourself from copyright infringement.

Under the guidelines of the Higher Education Opportunity Act, Seton Hall is required to maintain a reasonably secure network. Moreover, data breaches can result in significant costs to repair as well as damage to institutional reputation.  University IT Services takes its responsibility to maintain a secure network very seriously, while striving to ensure campus services are as easy to use as possible. Our aim is to provide the university with a safe and secure network that allows for academic freedom and the sharing of educational information while preventing copyright infringement that may arise from activities such as peer-to-peer and shared networking.

Keeping your Data Secure

E-mail, chatting and surfing the net has become such an integral part of our everyday life that we barely bat an eye when asked to create an account, enter credit card information, or some other piece of personal information about ourselves. We chat online, sign up for services, blog etc. But in the process, are we opening ourselves to problems such as identity theft? Learn what you can do to safeguard your equipment and data from cyber-attacks »

Sharing Data Responsibly

We all walk around with smartphones and other devices that we use to play music and games, watch movies and television shows. With the ease of the Internet, music, movies, and games are all right at our finger tips. More and more people are turning to the Internet and streaming media rather that renting a movie or buying a CD or DVD. The question is, how can you tell which sites are legal? When does downloading a song become a copyright infringement? Find out what you need to know to act responsibly »

Compliance with the Digital Millennium Copyright Act

Seton Hall is taking steps to ensure that members of the Seton Hall community comply with the Learn more about what you can do if you suspect an infringement »

Why is Security Awareness Important?

To protect the confidentiality, integrity, and availability of information in today's highly networked systems environment requires that all individuals:

  • understand their roles and responsibilities related to the organizational mission;
  • understand the organization's information technology security policy, procedures, and practices;
  • have at least adequate knowledge of the various management, operational, and technical controls required and available to protect the IT resources for which you are responsible.