GTIIT Cybersecurity and IT Policies

Cybersecurity and IT Policies

As a member of GTIIT, you have access to a wealth of security services and tools that will help you protect your computer, safeguard personal information, and secure sensitive University data. The Department of Information Technology proactively monitors our campus network and business systems to identify potential cybersecurity threats and quickly respond to cybersecurity issues. We offer a large variety of services, information, and tools to educate the GTIIT community about cybersecurity, network account and system protection, or incident reports. We are responsible for helping ensure the University’s computing environment is protected from cyber threats such as viruses, malware, phishing, hackers, and other security threats. To meet this goal, we have developed policies and instructions that guide everybody in protecting computers and sensitive information from security threats. Also, we assist the University administration with adhering to local regulations and Technion policies regarding technology. For more information, please refer to our IT Policies page.

Security Incident Response

The National Multi-Level Protection Scheme(‘MLPS’) is used to more effectively classify risk and set strategic security priorities at the Guangdong Technion-Israel Institute of Technology. To help protect the University, we utilize a robust and layered array of centralized security measures. These measures include campus network firewalls, IT infrastructure monitoring, business application monitoring, proactive auditing, VPN solutions, security experts from Technion and local authorities, advanced detection and prevention tools, and more.

IT Policy

Code of Practice for the use of computing resources

Any reference to computing resources, i.e. campus network or facilities applies, where appropriate, to those owned by GTIIT, or under its responsibility and must comply with this policy. To be permitted to use GTIIT computing facilities, users are deemed to have read and be bound by this Code of Practice and GTIIT regulations.

User Acceptable Policy

This document outlines the responsibilities of users of Guangdong Technion-Israeli Institute of Technology (hereinafter GTIIT) information resources, which are provided to the university community in support of the institutional mission. The purpose of this document is to ensure use of these resources complies with Technion global policies and applicable local requirements. These directives apply to all users of GTIIT information resources.

Computing Device Provisioning Policy

GTIIT computing device is provided by the IT (Information Technology) Department which runs the University’s computing hardware, software, and technical support for the University’s business. It is necessary to establish a reliable and supportable operating environment for computing devices while also reducing risk to the comprehensive computing infrastructure.

The purpose of this policy is to outline the process by which GTIIT acquire all computing device. The goal of the policy is to ensure each GTIIT employee has adequate computing resources to perform their assigned responsibilities while also providing prudent stewardship of GTIIT resources.

Protecting your account

Do not share your password with anyone, not even a member of staff. IT will never ask anyone to reveal a password and neither should any other GTIIT staff member. If you believe that your account has been compromised, change your password immediately.

Tags