Student Computer and Information Security

Student Computer and Information Security

Federal law requires that the University safeguard students' personal information, financial information, and educational records. In the wrong hands, your personal information can allow hackers to steal your identity, perform fraud, and commit other illicit activities. IT provides technology to help the rest of the University protect your information. IT also provides resources to help you protect yourself.

Your responsibilities as a student

The steps that the University takes to protect your information are just the beginning. As a student, you have access to the University's various IT resources, including its data, systems, and network. Your access to these IT resources is dependent on your choice to use them appropriately and securely. You must take steps to protect yourself, your information, and your devices as well as the University's IT resources:

  1. Use IT resources appropriately
  2. Take responsibility for your device's activity
  3. Protect and clean your computer
  4. Use strong and unique passwords
  5. Protect yourself from phishing and other fraud
  6. Understand copyright laws and file sharing
  7. Protect your online reputation
  8. Understand the consequences for violating the rules

Before you begin

When you connect your computer, tablet, gaming console, smartphone, or other internet-capable device to the University's network, you are joining our electronic community. Before you select an email address or connect a device to our network, you must complete the Secure UD Student Agreement to acknowledge that University policy and guidelines set expectations for your online behavior.

Other resources

The University provides a number of resources to help you learn how to protect your information and devices while computing: