IT Security

Best Practices

Standards for network connectivity help to mitigate the various risks.  This best practice outlines minimum standards for devices connecting to the campus network (additional requirements may apply to specific devices which have been identified as having increased risk due to network location, sensitivity of data stored/sent/received, or access to other systems):

The stance of the Information Security Office within DotCIO is that access to Rensselaer data and systems for business operations should only be through Rensselaer owned and managed devices with appropriate security controls and configurations.   Please review the Information Classification Policy; by policy, personally-owned devices cannot not be used to store confidential data.  

Back to top