Safeguarding the University of Manitoba's IT resources, technology and data requires a team effort. True information security asks that all our stakeholders including students, staff and faculty make a commitment to being aware of and following our Policies, Usage Agreements and Procedures.
Your access and usage privileges to University resources requires that you act responsibly, legally and respect the integrity of other people and university systems. These policies and procedures lay out the standards and responsibilities you must follow:
For information on how to protect data when transferring ownership, or disposing of, an electronic device or media, click here: Custody and Control of Electronic Devices and Media
For additional information on access and privacy, click here
► What is malware or spyware? ► What is malware or spyware?
Malware or spyware is an umbrella term for malicious software or programs that access your data discreetly by infecting your technology. They almost always do some kind of harm.
► What is spam?► What is spam?
Spam is unsolicited junk email normally with some kind of sales or advertising content.
► What is phishing?► What is phishing?
Phishing is electronic identity theft and could lead to financial theft
► What is the University doing about phishing and spam?► What is the University doing about phishing and spam?
We employ an email security solution called Ironport but no spam or email filter is perfect so we advise that everyone should be aware of best practices and remain vigilant when opening email from unfamiliar sources and clicking suspect links