Penn Computing

Penn Computing

Computing Menu Computing A-Z
Computing Home Information Systems & Computing Penn

 

Saturday, April 30, 2016

 
  New Resources
Security Logging Service
Travel Tips for Data Security
Free Security/Privacy Training Resources
Penn+Box
Two-step verification
Combating Malware
SafeDNS
Phishing Archive
Cloud Computing and Data Outsourcing
Best Practices for Applications with Confidential University Data
 
  Security "Greatest Hits"
Managing Passwords
E-mail Harassment & Forgery
Hoaxes, frauds & scams
Spam
Phishing
Wireless Networking
Encryption
 
  Best Practices
Secure desktop computing
Secure servers
Secure data deletion
Securing printers
Tips for safe computing
Computing policies
 
  More in-depth information for
Local support providers
System administrators
 
  Security initiatives
Critical Component compliance
Authentication & authorization
Penn Security & Privacy Assessment (SPIA)
Security Liaisons (Restricted Access)
Secure Share
Secure Space
Vulnerability Scanner
 
  Related links
Electronic privacy
PennKey
Viruses
Worms, trojans, backdoors

One Step Ahead: Almanac Security Tips - 2016

In each issue, Penn's Journal of Record, The Almanac publishes helpful tips and hints for dealing with information security and privacy matters. This page is a collection of all those published thus far.
New! You can now receive new One-Step-Ahead Security and Privacy Tips automatically!
You can subscribe via Email or RSS.


Table of Contents (view all)

Most recently published...

Personal vs University Accounts
Reuniting with your Missing Mobile Device
LastPass Premium:  Penn-Provided Software to Help Manage Your Passwords Securely
Filing Taxes Online This Year? Take Steps to Protect Your Information!
February is Data Privacy Month
Mobile Devices and Public Wi-Fi - Stick to Window Shopping
TMI: The Risks of Sharing Too Much Information on Social Media
Make Sure Your Email Gets Into Their Inbox
Avoiding Phishing Attacks
Be Wary of Fake Tech Support Telephone Call Scams!
Tips for Handling Electronic Access in Employee Termination
National Cyber Security Awareness Month - Free Secure Disposal of Paper
Begin the "Year of Discovery" By Knowing the Rules for Protecting Student Record Informati
Welcome Back! Here's a Map to Good Information Security
Email Risks: Well Beyond the Encryption Problem


Whats popular?

   privacy    security    identity theft    passwords    software    www    email    home computing    phishing    virus    hackers    documents        SSNs    mobile devices    keyloggers    wireless    social networking

Tuesday, April 19, 2016 - Almanac Vol. 62, No. 31

One Step Ahead: Personal vs. University Accounts

More so than ever before, the lines between personal and professional digital life tend to overlap for many individuals. While incidental and occasional personal use of University systems, including e-mail, is permissible, it is important to remember that once a person no longer has an active affiliation with Penn, his or her University accounts are disabled. This means he or she can no longer access many University services and resources such as Penn email accounts, Penn+Box and LastPass.

It is therefore recommended that you:

  • Do not use your Penn email address for personal correspondence or for user names and recovery addresses of personal accounts.
  • For third-party services that you could potentially use after separating from Penn, use a non-Penn email address to create the account when possible (e.g., LastPass).
  • Avoid storing your private information or personal records on University electronic resources or systems.
  • Understand that your University accounts will not remain active and accessible if you leave Penn. You will want to ensure that you follow the Guidance on Disposition of Documents and Data of Faculty and Staff who are Leaving Penn, available at http://www.upenn.edu/oacp/privacy/assets/pdf/DispositionOfDocumentsGuidance.pdf
  • Talk to your Local Support Provider (LSP) well in advance of any departure from Penn. Your LSP can help you prepare.
top

Information Systems and Computing
University of Pennsylvania
Comments & Questions


Penn Computing University of Pennsylvania
Information Systems and Computing, University of Pennsylvania