Secure Computing Request

Overview

Purdue IT supports several tools that facilitate secure computing.

Common Requests

  • Questions about the tools listed above

 

Links to related Knowledge Base articles can be found in the "Related Articles" panel.
 
Purdue IT Request

Related Articles (9)

Article explains how to apply Microsoft Sensitivity Labels to documents in both the desktop and browser versions of Microsoft software.
Article explains the differences bewteween the "Sensitive Data - Purdue Only" and the "Restricted Data - Purdue Only" sensitivity labels.
Phishing refers to someone who sends an e-mail to you, claiming to be someone they are not to trick you into divulging personal or confidential information.
Instructions on how to share a file with FileLocker,
An open-sourced program created by Purdue IT Networks and Security, Filelocker allows faculty, staff, and students a convenient, secure way to share files with other people, both on and off campus.
Instructions on how to access and download to Filelocker, an open-sourced program created by Purdue IT Networks and Security.
All the information regarding restricted data.
The document outlines the standards for configuring university owned machines for security and compliance purposes.
FileLocker is a Web-based application that was created to securely share files across campus and externally.