It can be sometimes difficult to understand your role in protecting college data and information resources. This page was designed to serve as a reminder of your responsibilities and guide you along the way.
All users of information resources:
- Must not abuse their privileges. The Acceptable Use of Information Resources policy defines the expectations and the activities that are prohibited.
- Protect the data in their possession according to the classification category that is assigned and follow the procedures set by the data owners.
The items below are links to resources for employees:
- CIS Benchmarks (Licensed for all STC employees and students)
- Duo Security Device Management Portal (STC Network Only)
- FED VTE (Training available for all STC employees)
- Media Handling Infographic
- STC Email Quarantine
- Secure Share Service
- Secure VPN Service