Search3 Results
- Knowledge Base
- OIT Policies & Standards
- Enterprise Information Security
In order to assure data integrity and network security, the Office of Information Technology at the University of Central Oklahoma has taken measures to ensure that information can only be accessed or modified by those authorized to do so. Procedures have been implemented to protect data integrity from environmental hazards as well.
- Knowledge Base
- Technology Support and Resources
- Devices, Software & Printers
UCO workstation computers are occasionally restarted during maintenance periods. These restarts, sometimes called reboots, help keep your computer up-to-date and protected from malware. The monthly maintenance schedule is available online for your review.
- Knowledge Base
- OIT Policies & Standards
- Enterprise Information Security
All UCO Faculty, staff, students and contractors are responsible for protecting the university data they access or use within the scope of their employment and must comply with the UCO Information Security Policy. The Data Classification Guide applies to all devices used to access university data including university owned and managed computers as well as personal devices (tablets, Smartphones, thumb drives).