Please do not close or refresh this window...
Tuesday, Jan 30, 2018 at 1:00 PM to 2:00 PM EST
Access code applied successfully. Remove
Invalid access code. Try again
What are the requirements for NU passwords? Can I use my NU network account for email related to my private business venture? When do I have to encrypt attachments? And what does all this have to do with Bitcoins?
Since our computing resources at Northeastern support the many educational, instructional, research, and administrative activities of the University, and provide users access to valuable University resources, sensitive and confidential data, and both internal and external networks, it’s important to know what our responsibilities are under the policy governing that access. Please Join AVP for Compliance John McNally, CISO and Co-Interim Vice President for Information Technology Services Mark Nardone, and Information Security Analyst Megan Perkins for an informative conversation about the provisions of the University’s Policy on the Appropriate Use of Network and Computer Resources, the next discussion in the Compliance Department’s series, the Compliance Colloquia. You’ll learn about the theory and legal frameworks behind the provisions, as well as the practical ways to fulfill the policy’s requirements and keep information safe.
When: January 30th 1-2 pm
Where: Alumni Center (6th Floor CP)
Compliance Department
Please enter below, the secure invite code provided to you by the event organizer in order to proceed...
(Please use a genuine email address. It will be used to validate your request)