Computer Security: Students
Federal law requires that the University safeguard students' personal information, financial information, and educational records. For example, the Family Education Rights and Privacy Act (FERPA) established requirements on how educational records must be protected.
In the wrong hands, your personal information can allow hackers to steal your identity, perform fraud, and commit other illicit activities. IT provides technology to help the rest of the University protect student information transmitted or retained by UD.
The steps that the University takes to protect your information are just a beginning. You must also take steps to protect your information, your computer, and other devices that you connect to the Internet. The University provides resources to help you learn how to protect yourself:
- Review IT's recommended best practices for configuring your computer and other devices securely.
- Review information from UD's Office of Public Safety about protecting devices from theft and recovering a stolen computer or device.
- Learn about how you use your electronic identity to access UD systems.
- Learn about the consequences of copyright infringement.
- Contact the IT Support Center if you need technical assistance.
Before you begin
When you connect your computer, tablet, gaming console, smartphone, or other Internet-capable device to UD's network, you are joining our electronic community. Before you select an email address or connect a device to our network, you must complete the Electronic Community Citizenship Examination (ECCE) to acknowledge that University policy and guidelines set expectations for your online behavior.
- Review Acceptable Use of University IT Resources: Students before starting ECCE.
- The student Code of Conduct requires you to follow the University's Policy for Responsible Computing.