Safeguarding the University of Manitoba's IT resources, technology and data requires a team effort. True information security asks that all our stakeholders including students, staff and faculty make a commitment to being aware of and following our Standards, Policies, Usage Agreements and Procedures.
Your access and usage privileges to University resources requires that you act responsibly, legally and respect the integrity of other people and university systems. These policies and procedures lay out the standards and responsibilities you must follow:
The following Information Security Standards apply to all University Community members. Revisions or additions to these Information Security Standards may be undertaken by Information Security and Compliance under the authority of the Chief Information Officer.
The following Information Security Standards apply to IT Support. Revisions or additions to these Information Security Standards may be undertaken by Information Security and Compliance under the authority of the Director of Information Security and Compliance.
For additional information on access and privacy, click here
► What is malware or spyware? ► What is malware or spyware?
Malware or spyware is an umbrella term for malicious software or programs that access your data discreetly by infecting your technology. They almost always do some kind of harm.
► What is spam?► What is spam?
Spam is unsolicited junk email normally with some kind of sales or advertising content.
► What is phishing?► What is phishing?
Phishing is electronic identity theft and could lead to financial theft
► What is the University doing about phishing and spam?► What is the University doing about phishing and spam?
We employ an email security solution called Ironport but no spam or email filter is perfect so we advise that everyone should be aware of best practices and remain vigilant when opening email from unfamiliar sources and clicking suspect links