MIT Touchstone is a single sign-on web authentication service that allows members of the MIT community to log in to participating MIT and federated web sites using their MIT credentials. When using a Touchstone-enabled application, your credentials will never be passed to the application service.
Discover tips and steps you need to take to protect your data, your electronics, and your identity.
Protect your electronic devices from theft and your data from unauthorized access if lost or stolen.
As part of doing business at an institute of higher learning and as an Internet Service Provider (ISP), MIT must ensure that individuals who use its IT resources are following the rules and legal requirements of the local, state, and federal governments. DMCA (Digital Milennium Copyright Act), PCI-DSS (Payment Card Industry Data Security Standards), and the Massachusetts Data Privacy Law 201 CMR 17 are just a few regulations that MIT must comply with.
Encryption is a method of securing data by scrambling the bits of a computer's files so that they become illegible. The only method of reading the encrypted files is by decrypting them with a key; the key is unlocked with a password.
Data discovery is the activity of finding where sensitive data resides so that it can be adequately protected or securely removed. IS&T distributes Spirion (formerly Identity Finder), a software tool that can easily retrieve electronic data stored on computers and servers.
IS&T can help to detect, respond to, and recover from intrusions and data disclosure incidents. This includes IT security incidents involving electronic MIT business data of any kind.
The Virtual Private Network (VPN) assists with connectivity on and off campus. IS&T recommends and supports Cisco's AnyConnect VPN, a VPN client that works on a wide variety of operating systems and hardware configurations.
Media sanitizing is electronic file destruction. In the same way that paper files containing sensitive information can be shredded or burned, electronic files can be destroyed using various methods. The most effective form of electronic data destruction is done with file shredding software.