Articles (61)

After an Incident

This guide is for the cybersecurity incident response team after incident recovery of an OU computer which has been involved in a cyber incident (for example, a malware infection or unauthorized access).

Controlled Unclassified Information (CUI)

This article provides insights into CUI @OU, what you need to do to protect CUI, and what OU IT is doing to protect CUI @OU.

Data Flow Diagrams

Use this article to help ensure compliance with HIPAA, PCI DSS, FERPA, CJIS, and NIST 800-171 (CUI).

During an Incident Checklist

This guide is for the cybersecurity incident response team who is investigating an OU computer which has been involved in a cyber incident (for example, a malware infection or unauthorized access).

How to read an IT Security Assessment Report

Starting July 1, 2024, the OU IT Security Profile Summary, shared when a security assessment has been completed, is changing it’s look and feel.

Managing Cybersecurity Risks

OU IT offers a variety of services that can be used by researchers. Use this article to help you select the appropriate level of security needed for your project, based on the sensitivity of the data, and then use this document to help you select IT services that will enable your research project.

Report Security Incident Checklist

This guide is for the user or owner of a OU computer which has been involved in a cyber incident (for example, a malware infection or unauthorized access).

Security for Microsoft SharePoint and Teams Owners

As an Owner of a Microsoft SharePoint site or Teams space, you play a critical role in protecting institutional data and ensuring compliance with security and governance policies.  This guideline outlines your responsibilities to secure data, manage access, and periodically review permissions.