Sitemap
- About
- Our Organization
- Business Planning and Administration
- Data & Systems Security
- Data Strategy
- Design Practice
- Educational Technology Systems (ETS) and Learning Spaces
- Enterprise Applications
- Enterprise Infrastructure
- Enterprise Operations & Support
- Information Security
- Library Technology
- Network Services
- Project Portfolio Management
- Research Technology (RT)
- TTS Organization Charts
- Leadership
- Careers
- Contact Us
- Key Projects and Highlights
- IT Service Partners (ITSP)
- Memberships
- Policies and Guidelines
- Information Stewardship Policy
- Routine/Preventive (Server & Database) Maintenance Standard
- Tufts Off-Campus, Telecommuting, and Personal Devices Guidelines
- Cloud Computing Services Policy
- Digital Millennium Copyright Act
- Email Policy
- Guide to Massachusetts Data Privacy Laws
- Information Technology Acquisitions Policy
- Mailing List Policy
- Network Use Policy
- Overview of Your Rights and Responsibilities Online
- Secure Mobile Device Policy
- Technical Requirements Matrix for 201 CMR 17
- Tufts Box Use Guidelines
- Tufts Password Policy
- Tufts Security and Privacy Program
- Tufts Two-factor Authentication (2FA) Policy
- Tufts University Participant Operating Practices for InCommon Federation
- Our Organization
- Engage with Us
- Research Technology
- Secure Computing
- Fraudulent Unemployment Claims and Identity Theft
- Antivirus Applications
- Cyber Security Awareness
- Data Security and Privacy
- Confidential Information Destruction
- Contact Information Security
- Cyber Security Awareness
- Data Privacy
- Data Security and Privacy
- Email Restrictions for Sensitive Personal Information
- Email Security Tips
- Information Stewards
- Password Security
- Protecting University Data
- Working with Sensitive Information
- Information Stewards
- Research Tools: Security and Privacy
- Reporting an Information Security Incident
- Securing Devices
- Security Consults
- Get Help
- Quick Links