- Created by Maria Piret, last modified on Apr 25, 2023
Description
The University continually develops, maintains and improves its information technology (IT) infrastructure and applications to support the creation, storage, modification and sharing of data on a continuous basis. The University, therefore, has a responsibility to institute appropriate safeguards to keep its IT systems and information assets secure and comply with various regulatory requirements designed to keep certain types of data secure and confidential.The security of these systems is dependent on the individuals managing the resources as well as the individuals utilizing said resources. The University is committed to supporting the principles of academic freedom and the free exchange of ideas and the University's information security policies and programs to support those principles while still maintaining an adequate balance of security.
Our goals are to:
- Develop, implement and maintain standards and guidelines to help protect the University's IT systems and information assets from unauthorized access, alteration, or disclosure.
- Ensure the privacy of faculty, staff and student information and that of other University customers or associates.
- Protect the reputation of the University and ensure compliance with federal and state laws and regulations.
- Develop resources, and establish guidelines that allow all individuals within the University community to practice good data stewardship.
Students, Faculty and Staff
Unsolicited spam email & phishing scams targeting Lynn University students or email abuse should be reported to the IT Support Services:
- FAQ: IT Support FAQ
- Open a Service Desk Issue: Lynn University Service Center
- Email: SupportServices@lynn.edu
- Call: 561-237-7979 (x7979)
- Customer Service Desk Location: First Floor Eugene M. and Christine E. Lynn Library
- Book an appointment
- Remote Support Portal
- Hours: Monday – Friday 8:00am – 5:00pm
![]() ![]() Cyber Threat Alert Updates from Multi-State Information Sharing and Analysis Center (MS-ISAC) |
---|
Threat Level - GUARDED |
![]() ![]() Industry news, product updates, videos, infographics, and more from CIS. |
---|
CIS Controls Volunteer Spotlight: Tony Krzyzewski
Tony Krzyzewski has done a lot to support cyber defense as an ambassador and volunteer in the CIS Controls Community. Hear his story. |
CIS Controls Community Volunteer Spotlight: Alan Watkins
Alan Watkins has done a lot to support cyber defense as an ambassador and volunteer in the CIS Controls Community. Hear his story. |
CIS Controls Community Volunteer Spotlight: Greg Carpenter
Greg Carpenter has done a lot to support effective security controls for cyber defense as a volunteer of the CIS Controls Community. Hear his story. |
CIS Controls Community Volunteer Spotlight: Staffan Huslid
Staffan Huslid has done a lot to support effective security controls for cyber defense as a volunteer of the CIS Controls Community. Hear his story. |
CIS Controls Community Volunteer Spotlight: Phil Langlois
Phil Langlois has done a lot to support effective security controls for cyber defense as a volunteer of the CIS Controls Community. Hear his story. |
Related Pages
- No labels