Search U of T’s information security guidelines

Guidelines: Best practices and approaches to protecting digital assets

Overview

Guidelines are best practices and approaches to protect digital assets based on U of T’s information security standards. They provide guidance to the U of T community on implementing practices that mitigate security risks.

Guidelines: Best practices and approaches to protecting digital assets
System interacting with operational technologies

Operational technology security guidelines

Unauthorized changes to operational technology (OT) controls could have serious negative effects for U of T. These guidelines outline controls applicable to OT systems and provide guidance on securing OT at U of T.

System interacting with operational technologies

Vulnerability management guidelines

Vulnerability management is a process by which identified vulnerabilities are tracked, evaluated, prioritized and managed until the vulnerabilities are remediated or otherwise appropriately resolved. These guidelines ensure that appropriate actions are taken to reduce the potential that these vulnerabilities are exploited.

AI

Guidelines on using AI responsibly

As artificial intelligence becomes a crucial part of various systems, it’s important to exercise caution when working with AI systems to ensure data privacy and security.

AI
Mobile apps on a mobile phone.

Privacy and security for mobile apps

Guidelines for the U of T community to understand, watch out for and mitigate security risks on apps and social media.

Mobile apps on a mobile phone.
A fence

Remote work

If you work remotely with self-managed devices (home computers, laptops, phones, etc.) and access institutional data, it is your responsibility to secure your devices and use them responsibly.

A fence
Computer with a chain around it.

Ransomware

Ransomware is one of the University’s greatest security threats. These guidelines provide guidance about how to prepare for and manage ransomware attacks.

Computer with a chain around it.