While Hampshire's information technology department is responsible for maintaining a secure electronic environment, everyone is responsible for handling information in all formats according to state, federal, and College policies and procedures.
Information is an asset that exists in many forms: written, spoken, electronic. Whatever form the information takes, it needs to be appropriately protected. In an increasingly interconnected global environment, adequate protection of information involves a number of steps, including policies, processes, procedures, and software and hardware controls.
You are responsible for the security of your account and the confidentiality of your password. Learn how to keep it secure, keep it safe, and keep it private.
Every year Hampshire employees and students fall for phishing scams, compromising our systems and security. Phishing is the practice of sending fraudulent emails appearing to come from a legitimate source in an attempt to obtain personal information. These scammers "phish" to see how much info they can "catch". Find out how to avoid these common schemes.
Protect yourself from online hazards and predators. A variety of threats to a wide range of computing devices from client computers to mobile devices (smart phones, iPads, etc.) to servers are increasing in both number and complexity. Personal responsibility for protecting your computer and files has increased along with these threats. Learn safe computing practices and how to remove these threats.
Get anti-virus software and get tips on avoiding viruses in the first place. Viruses and worms can be spread via web pages, downloads, email, attachments, USB drives, network shares, and instant messaging. To reduce the potentially devastating impact of viruses, Hampshire College requires the installation of active and up-to-date anti-virus software on all student, faculty, and staff computers that use the College's network.
Hampshire College has policies and guidelines to govern the use of many of the services provided by IT. The policies below cover how we store and transmit data. If you work here, you need to be aware of them.