results for "office"
Results 1-10 of 10
Results Per Page: 
E-mail: Obtain the E-mail Headers Email headers contain important diagnostic information about the route an email message takes and the results of different security and authenticity checks. When reporting a message through the Report Phishing option in Outlook , the message and all of its header information are provided to the LSU IT Security and Policy (ITSP) team for evaluation.
Article Id: 14922

Security of Data Policy Statement In accordance with PS-124 Data Management , it is essential that confidential and/or private data be protected. It is very important to understand that confidential and/or private data could exist on your computer hard drive. When there is a loss of data through a security breach, a social engineering attack, or a hardware failure, there is a...
Article Id: 8037

General Information Departments on LSU's campus have to abide by LSU policies, and various State and Federal laws and regulations. Departments may also be required to comply with industry regulations (e.g., Payment Card Industry) or contractual obligations for research and/or collaboration. There are various challenges that may be encountered while determining the level of...
Article Id: 12967


Legislation and Confidentiality of Records The Family Educational Rights and Privacy Act (FERPA) The F amily E ducational R ights and P rivacy A ct of 1974, also known as the Buckley Amendment, is a federal law that protects the privacy of student “education records.” “Education records” are defined, with a few exceptions, as records containing information directly related...
Article Id: 6644

WHAT MAKES FILE SHARING ILLEGAL? The Digital Millennium Copyright Act (DMCA) is a piece of legislation signed into law in 1998 defining the illegal downloading and/or sharing of copyrighted material. LSU is required to investigate DMCA complaints and take action to remove infringing content. HOW DOES THIS APPLY TO ME? Copyright holders (or organizations...
Article Id: 17129

General Information Disclaimer: BEFORE USING ANY Encryption Programs, please contact your Local TSP (Technology Support Professional) or IT Administrator / Contact. If you are required to or you do store sensitive information on an electronic device, you should protect yourself and the University by encrypting the data. You are able to ENCRYPT the Data ONLY WHEN...
Article Id: 6983

Article Id: 20163

Article Id: 19781

Note: SSLv3 or older protocols as well as TLS 1.0 and 1.1 should no longer be used. Use TLS 1.2 should be used instead. ? Recommendations for Microsoft Internet Information Services (IIS): Changing the SSL Protocols and Cipher Suites for IIS involves making changes to the registry. It is not direct or intuitive. Therefore, instead of repeating already published information, please...
Article Id: 17596

Provide Search Feedback Logo
Search Google Logo