Skip to main content
RIT Logo with Text
✕

Mobile main navigation

  • About
    • Contact Us
    • What We Do
    • Information Security Council
  • Policies & Standards
    • Account Management
    • Cyber-Security Incident Handling Standard
    • Desktop & Portable Computer
    • Disaster Recovery
    • HIPAA Compliance
    • Information Access and Protection Standard
    • Information Security Policy
    • Network Security Standard
    • Passwords
    • PCI DSS
    • Portable Media
    • Server Security Standard
    • Signature Standard
    • Solutions Life Cycle Management
    • Standards Lexicon
    • Web Security
  • Requirements
    • Cybersecurity and Research at RIT: Regulatory Compliance
    • Email at RIT
    • Faculty and Staff
    • Information Handling Resources
    • IT Risk Assessment Process
    • Private Information Management Initiative
    • Privileged Users
    • RIT Information Handling and Services Matrix
    • Roles and Responsibilities
    • Standards & Exceptions Process
    • Students
  • Best Practices
    • Backing Up Your Data
    • Client Input Filtering Practices
    • Cloud Computing Best Practices
    • Creating Strong Passwords
    • Doxing Mitigation
    • Generative AI
    • InsightIDR by Rapid7
    • Keeping Safe Online
    • Mobile Security
    • Online Security
    • Printer Best Practices
    • Securing Your Computer
    • Traveling Abroad
    • Wireless Networking Safety
  • Resources
    • Apache Log4j Mitigation
    • CyberEscape Online
    • Forms, Checklists, and Templates
    • Host Intrusion Prevention
    • Logon Banners
    • Position Papers
    • Regulations and Standards Compliance Matrix
    • Security Assessment Tools
    • Technical Resources
    • Types of Threats
    • Vulnerability Management Program at RIT
    • RIT Phish Bowl
    • Encryption at RIT
Information Security Office
✕
Future Students Current Students Parents Faculty and Staff Alumni Partners

Request Info Visit Apply Give
Future Students Current Students Parents Faculty and Staff Alumni Partners
Request Info Visit Apply Give
RIT logo and full name
Information Security Office
News Directory myRIT
  • About
    • Contact Us
    • What We Do
    • Information Security Council
  • Policies & Standards
    • Account Management
    • Cyber-Security Incident Handling Standard
    • Desktop & Portable Computer
    • Disaster Recovery
    • HIPAA Compliance
    • Information Access and Protection Standard
    • Information Security Policy
    • Network Security Standard
    • Passwords
    • PCI DSS
    • Portable Media
    • Server Security Standard
    • Signature Standard
    • Solutions Life Cycle Management
    • Standards Lexicon
    • Web Security
  • Requirements
    • Cybersecurity and Research at RIT: Regulatory Compliance
    • Email at RIT
    • Faculty and Staff
    • Information Handling Resources
    • IT Risk Assessment Process
    • Private Information Management Initiative
    • Privileged Users
    • RIT Information Handling and Services Matrix
    • Roles and Responsibilities
    • Standards & Exceptions Process
    • Students
  • Best Practices
    • Backing Up Your Data
    • Client Input Filtering Practices
    • Cloud Computing Best Practices
    • Creating Strong Passwords
    • Doxing Mitigation
    • Generative AI
    • InsightIDR by Rapid7
    • Keeping Safe Online
    • Mobile Security
    • Online Security
    • Printer Best Practices
    • Securing Your Computer
    • Traveling Abroad
    • Wireless Networking Safety
  • Resources
    • Apache Log4j Mitigation
    • CyberEscape Online
    • Forms, Checklists, and Templates
    • Host Intrusion Prevention
    • Logon Banners
    • Position Papers
    • Regulations and Standards Compliance Matrix
    • Security Assessment Tools
    • Technical Resources
    • Types of Threats
    • Vulnerability Management Program at RIT
    • A picture of a fish inside of a fish bowl
      RIT Phish Bowl
    • Code like green text on a black background
      Encryption at RIT
File
RIT Ticketing System Agent Confidentiality Agreement form_0.pdf
Security logo lockup

Address and Phone

1 Lomb Memorial Drive
Rochester, NY 14623

Footer Main navigation

  • About
    • Contact Us
    • What We Do
    • Information Security Council
  • Policies & Standards
    • Account Management
    • Cyber-Security Incident Handling Standard
    • Desktop & Portable Computer
    • Disaster Recovery
    • HIPAA Compliance
    • Information Access and Protection Standard
    • Information Security Policy
    • Network Security Standard
    • Passwords
    • PCI DSS
    • Portable Media
    • Server Security Standard
    • Signature Standard
    • Solutions Life Cycle Management
    • Standards Lexicon
    • Web Security
  • Requirements
    • Cybersecurity and Research at RIT: Regulatory Compliance
    • Email at RIT
    • Faculty and Staff
    • Information Handling Resources
    • IT Risk Assessment Process
    • Private Information Management Initiative
    • Privileged Users
    • RIT Information Handling and Services Matrix
    • Roles and Responsibilities
    • Standards & Exceptions Process
    • Students
  • Best Practices
    • Backing Up Your Data
    • Client Input Filtering Practices
    • Cloud Computing Best Practices
    • Creating Strong Passwords
    • Doxing Mitigation
    • Generative AI
    • InsightIDR by Rapid7
    • Keeping Safe Online
    • Mobile Security
    • Online Security
    • Printer Best Practices
    • Securing Your Computer
    • Traveling Abroad
    • Wireless Networking Safety
  • Resources
    • Apache Log4j Mitigation
    • CyberEscape Online
    • Forms, Checklists, and Templates
    • Host Intrusion Prevention
    • Logon Banners
    • Position Papers
    • Regulations and Standards Compliance Matrix
    • Security Assessment Tools
    • Technical Resources
    • Types of Threats
    • Vulnerability Management Program at RIT
    • RIT Phish Bowl
    • Encryption at RIT
  • About
    • Contact Us
    • What We Do
    • Information Security Council
  • Best Practices
    • Backing Up Your Data
    • Client Input Filtering Practices
    • Cloud Computing Best Practices
    • Creating Strong Passwords
    • Doxing Mitigation
    • Generative AI
    • InsightIDR by Rapid7
    • Keeping Safe Online
    • Mobile Security
    • Online Security
    • Printer Best Practices
    • Securing Your Computer
    • Traveling Abroad
    • Wireless Networking Safety
  • Policies & Standards
    • Account Management
    • Cyber-Security Incident Handling Standard
    • Desktop & Portable Computer
    • Disaster Recovery
    • HIPAA Compliance
    • Information Access and Protection Standard
    • Information Security Policy
    • Network Security Standard
    • Passwords
    • PCI DSS
    • Portable Media
    • Server Security Standard
    • Signature Standard
    • Solutions Life Cycle Management
    • Standards Lexicon
    • Web Security
  • Resources
    • Apache Log4j Mitigation
    • CyberEscape Online
    • Forms, Checklists, and Templates
    • Host Intrusion Prevention
    • Logon Banners
    • Position Papers
    • Regulations and Standards Compliance Matrix
    • Security Assessment Tools
    • Technical Resources
    • Types of Threats
    • Vulnerability Management Program at RIT
    • RIT Phish Bowl
    • Encryption at RIT
  • Requirements
    • Cybersecurity and Research at RIT: Regulatory Compliance
    • Email at RIT
    • Faculty and Staff
    • Information Handling Resources
    • IT Risk Assessment Process
    • Private Information Management Initiative
    • Privileged Users
    • RIT Information Handling and Services Matrix
    • Roles and Responsibilities
    • Standards & Exceptions Process
    • Students
  • About
    • Contact Us
    • What We Do
    • Information Security Council
  • Resources
    • Apache Log4j Mitigation
    • CyberEscape Online
    • Forms, Checklists, and Templates
    • Host Intrusion Prevention
    • Logon Banners
    • Position Papers
    • Regulations and Standards Compliance Matrix
    • Security Assessment Tools
    • Technical Resources
    • Types of Threats
    • Vulnerability Management Program at RIT
    • RIT Phish Bowl
    • Encryption at RIT
  • Policies & Standards
    • Account Management
    • Cyber-Security Incident Handling Standard
    • Desktop & Portable Computer
    • Disaster Recovery
    • HIPAA Compliance
    • Information Access and Protection Standard
    • Information Security Policy
    • Network Security Standard
    • Passwords
    • PCI DSS
    • Portable Media
    • Server Security Standard
    • Signature Standard
    • Solutions Life Cycle Management
    • Standards Lexicon
    • Web Security
  • Requirements
    • Cybersecurity and Research at RIT: Regulatory Compliance
    • Email at RIT
    • Faculty and Staff
    • Information Handling Resources
    • IT Risk Assessment Process
    • Private Information Management Initiative
    • Privileged Users
    • RIT Information Handling and Services Matrix
    • Roles and Responsibilities
    • Standards & Exceptions Process
    • Students
  • Best Practices
    • Backing Up Your Data
    • Client Input Filtering Practices
    • Cloud Computing Best Practices
    • Creating Strong Passwords
    • Doxing Mitigation
    • Generative AI
    • InsightIDR by Rapid7
    • Keeping Safe Online
    • Mobile Security
    • Online Security
    • Printer Best Practices
    • Securing Your Computer
    • Traveling Abroad
    • Wireless Networking Safety
RIT logo and full name (footer)

Address and Phone

1 Lomb Memorial Drive
Rochester, NY 14623
585-475-2411

US News and World Report Badge for Best National Universities 2025
US News and World Report Badge for Best National Universities 2025
Website feedback Sign up for RIT news
US News and World Report Badge for Best National Universities 2025
About Academics Experiential Learning Admissions and Aid
Research RIT Life Athletics News

Copyright © Rochester Institute of Technology.
All Rights Reserved.

Land Acknowledgment
Nondiscrimination
Disclaimer
Emergency Information
Copyright Infringement
Accessibility
Privacy Statement
Search RIT
This website uses cookies to provide better user experience and functionality. You can control and configure cookies in your web browser. Cookie Statement | How to Disable Cookies