Skip to content
UT INSTITUTE OF AGRICULTURE
GIVE A-Z
  • OUR INSTITUTE
    • Leadership
    • Directory
    • AgResearch
    • Extension
    • Herbert College of Agriculture
    • College of Veterinary Medicine
    • Departments
    • Smith International Center
    • State Botanical Garden
    • Find Us
    • Employment
    • Support Us
    • News
  • ACADEMICS
    • Undergraduate Students
    • Graduate Students
    • Veterinary Students
    • Study Abroad
  • RESEARCH
    • AgResearch and Education Centers
    • Student Research
  • OUTREACH
    • Agriculture and Natural Resources
    • Community Economic Development
    • Family and Consumer Sciences
    • 4-H Youth Development
    • Herbert Outreach
    • Veterinary
    • Resource Library
    • Calendar
  • GIVE
  • A-Z
UTIA Information Technology Security Program
  • Committees
  • Compliance
    • FERPA
    • GDPR
    • HIPAA
    • PCI
    • UTIA Policies and Procedures
    • UT System Policies and Procedures
  • Incident Response
  • Security Awareness Newsletters
  • Services
  • Knowledge Base

Knowledge Base

Categories

  • Ask Your CISO
  • Compliance Areas
  • Current Non-Threats
  • Current Threats
  • Incident Response
  • Policies and Procedures
  • Security Awareness Newsletters
  • Services

Tags

AUP Backups Browsers Classification Cybersecurity Cybersecurity Awareness Month DocuSign Duo Email encryption feature Fraud Global Cybersecurity News HIPAA Hoax Important Information Incident Malware MFA Microsoft 365 Multifactor Authentication Passwords PCI Phishing Policy Privacy Ransomware Reporting Cybercrime Reporting Phishing & Junk Emails Risk Scam Security Awareness security awareness training Security Tips Smishing Social Media Scams Spear Phishing Tips Training Updates UT Vault 2.0 Virus Scanning Vishing VPN Zoom

Archives

Communicating About IT Security

Posted on Apr 29, 2020
man juggling laptop and shields

Topics covered in this newsletter include Communicating Trending Scams, and Updates to the Information Access Control Policy and the Payment Card Industry (PCI) Security Awareness Policy.

Policies and Procedures / Security Awareness Newsletters / PCI

Beyond Phishing

Posted on Mar 25, 2020
signs all saying fraud alert

Topics covered in this newsletter include Phishing, Spear Phishing, Vishing, and Smishing.

Current Threats / Security Awareness Newsletters / Email / Phishing / Scam / Spear Phishing

Working Securely From Home

Posted on Mar 18, 2020
laptop screen showing the use of a VPN

This seems to be a very opportune time to remind everyone about how to work securely fromhome. You: First and foremost, technology alone cannot fully protect you; you are the…

Compliance Areas / feature

General Right & Information Included in the Right of Access: The “Designated Record Set”

Posted on Aug 28, 2017
a tablet and a stethoscope

General Right The HIPAA Privacy Rule generally requires organization’s health plans and most health care providers (Covered Entities) to provide individuals, upon request, with access to the protected health information…

Compliance Areas / HIPAA

State Law Pre-emption & Permitted Uses and Disclosures: Exchange for Health Care Operations

Posted on Jul 31, 2017
a tablet and a stethoscope

State Law Pre-emption State laws that are contrary to the HIPAA regulations are pre-empted by the federal requirements, which means the federal requirements will apply. “Contrary” means it would be…

Compliance Areas / HIPAA

Storage Security & Mobile App Security

Posted on May 29, 2017
a tablet and a stethoscope

Storage Security An end user device is a personal computer (desktop or laptop), individual device (e.g., personal digital assistant [PDA], smart phone, etc.), or removable storage media (e.g., USB flash…

Compliance Areas / HIPAA

Right to Confidential Communication & Threat

Posted on Apr 24, 2017
a tablet and a stethoscope

Right to Confidential Communication Accommodate reasonable requests for communications to individuals by alternative means or at alternative location: Some individuals may prefer communications through unencrypted e-mails; Other individuals may not…

Compliance Areas / HIPAA

Install a Personal Firewall & Keep a Clean Machine

Posted on Mar 27, 2017
a tablet and a stethoscope

Install a Personal Firewall A firewall detects any unexpected incoming connections from the Internet or unexpected outgoing connections o the Internet. These connections may be used to send information from…

Compliance Areas / HIPAA

Issues Related to De-Identification & Install Anti-Virus Software (“AV”)

Posted on Feb 27, 2017
a tablet and a stethoscope

Issues Related to De-Identification De-identifying PHI according to HIPAA Privacy Rule may enable many research activities; however, the HIPAA Privacy Rule recognizes researchers may need access to, and the ability…

Compliance Areas / HIPAA

Personal Password Security & Potential HIPAA Security Violations

Posted on Sep 26, 2016
a tablet and a stethoscope

Personal Password Security Recent hacking events at retail stores and financial institutions have made us more aware about protecting our personal passwords. How often do you change passwords for your…

Compliance Areas / HIPAA

Posts pagination

Newer Page 1 … Page 16 Page 17 Page 18 Older

Sandy Lindsey
Chief Information Security Officer
Information Technology Services
The University of Tennessee
Institute of Agriculture

 

 

G061​ McCord Hall
2640 Morgan Circle Drive
Knoxville, Tennessee, 37996
Phone: (865) 974-7292; (865) 806-5224
sandy@tennessee.edu

real life solutions logo

The University of Tennessee Institute of Agriculture
2621 Morgan Circle, Knoxville, TN 37996

Personnel Directory | Office of Sponsored Programs
Disclaimer | Indicia | EEO/AA Statement/Non-Discrimination
Title IX | Programs for Minors
Branding | Website Accessibility | Privacy Notice

Sign in to myUTIA | Sign in to WordPress