Primary Campus: Knoxville

NetID Account Creation and Management

What is a NetID? All students, faculty, staff, and authorized guests at the University of Tennessee are provided with a Network Identifier/NetID (username) and password when they join the university. A NetID permits secure access to a variety of applications and services, including: UT Email, Microsoft Office 365, MyUT, wireless access, Banner, Blackboard, and UT… Read More

Service Categories: ,

Policy Creation

IT and Information Security Standards and Practices are created and updated when necessary. IT Standards and Practices can be internal and external.  IT Standards and Practices sets guidelines and rules for the campus and ITS Staff regarding Information Security and Technology requirements. Standards and Practices are reviewed and approved by the IT Directors, CIOAC, ISAC,… Read More

Service Categories: ,

Security Plans

A Security Plan is required, per UT Systems IT Policy IT0121, for computer systems at the UTHSC. This new policy became effective January 1, 2010; the initial security plans are to be done by beginning of the calendar year.  Specific dates will vary but campus will be notified. Security Plans are to be prepared by… Read More

Service Categories: ,

Forensic Analysis

Computer forensics is the practice of collecting, analyzing and reporting on digital data in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. Forensics Analysis provides the user with detailed findings in the areas of: Intellectual property theft… Read More

Service Categories: ,

Security Assessment

The IT Security Team assesses and measures current security controls, policies, and best practices in specific UTHSC departments, colleges, areas, clinics, and other UTHSC-owned entities. Assessments are reviewed by IT Security.  After review process is complete, IT Security will make suggestions to said area on what they can do to improve security.

Service Categories: ,

Risk Management

An effective risk management process is an important component of a successful IT security program.  The principal goal of UTHSC’s risk management process is to protect the organization and its ability to perform the mission.

Service Categories: ,

Computer Skills Training

The Application Support team provides students, faculty, and staff with basic computer skills and desktop application training. Delivery methods include instructor-led courses, one-on-one sessions, and self-paced online tutorials.  One-on-one and small group sessions are paced to meet the users’ skill levels. Training is available for the Microsoft Office 365 suite of products, as well as… Read More

Service Categories: , , , ,