Skip to main content
Live now: Board of Curators meeting
Site Search:
Columbia
Kansas City
Rolla
St. Louis
About
Who We Are
Facts and Figures
Statewide Reach
History
Strategic Planning
Curators
Overview
Meeting information
Members
Officers
Committees
President
About the Office
About the President
Programs
Departments
Academic Affairs
Engagement and Outreach
Equity and Title IX
Ethics, Compliance, and Audit Services
Finance
General Counsel
Government Relations
Human Resources
Information Technology
Missouri Online
Research and Economic Development
Strategic Communication
University Data, Analytics, and Institutional Research
News
Highlights
Features
Releases
Quick Links
Bids
Collected Rules and Regulations
Employee Benefits
myHR
NextGen Precision Health
Policy Manuals
Reporting Concerns
Web Apps
Webmail
Full A-Z Index
UM System
Breadcrumb
Home
Inside UM System
Information Technology
Information Technology Security Office
Best Practices
Tools
Establish/Forgot/Change Password
Manage MFA Settings
Best Practices
IT Home
InfoSec
Sections
Best Practices
IT Security by Campus»
Columbia
Kansas City
Rolla
St.Louis
Program Administration»
Roles & Responsibilities
Information Security Officers
Information Security Risk Management
Email Modernization
Data Classification System»
Definitions»
DCL1--Public
DCL2--Sensitive
DCL3--Restricted
DCL4--Highly Restricted
Other Definitions
Sections»
Systems & Applications
Workstations
Mobile Devices
Network Device Hardening Standard
Portable Storage Devices
Standards»
Data Management Standard
DCL3/DCL4 Transmission
Encryption
Logging
MFA for E-mail
Network
Passwords
SSN Use
Travel
Vulnerability Scanning
Workstation Management
Access Control»
Access to IT Accounts & Electronic Information
Securing Resources»
Administrative Applications Database Security
Reuse, Transfer or Resale of Electronic Storage Devices
Management, Access, and Use of IT Resources
Research Data Security
Human Resource Security»
Mandatory Reporting Requirement
Security Training
Identity Management
Vulnerability Management
Procurement
Social Security Number Program Element
Business Continuity
Secure Authentication»
Introduction to Secure Authentication
Account and Password Management
Administrator Account Management
O365/MFA Implementation FAQ
Secure Authentication FAQ
Secure Authentication for Email FAQ
Security Keys
EU General Data Protection Regulation