Information Technology (IT) Security

In order to use the university's network and technology services, each member of the Rice community agrees to abide by Policy 832-99, Rice's Appropriate Use of Computer Resources.  Appropriate and responsible use means you will:

  • protect your personal information and Rice's data.
  • clean and guard your computer from malicious threats that expose the Rice network to outside hackers.
  • secure the Rice data you handle by using encryption and other security measures, especially when storing data on portable devices.
  • destroy Rice data stored on equipment scheduled for disposal or recycling.

The IT Security Office offers advice and guidance in all these areas. Contact the IT Help Desk for advice or specific questions.


Data Security for Rice Research and Projects

Protecting sensitive and confidential Rice information is critical to the university's success.   These tips will also help protect your own personal identity.

Protection Depends on You

Tools such as Clean Access and Trend Micro Offices can help protect the Rice computing environment by locking out attackers. However, the most important piece of Rice's protection plan is you. 

  • DO NOT open unsolicited email attachments for any reason. The minute you click on the attachment, a virus infection process begins. By refusing to open unsolicited attachments, you are protecting your computer and many Rice resources linked to your computer.
  • Be wary of any email message asking you to verify your account. 
  • DO NOT use your NetID password on any external (non-Rice) web site.  Hackers steal Rice login information from external web sites in order to attack Rice sites and systems.
  • Protect your computers by using anti-virus tools and Clean Access.
  • How to Protect Your Computer From Viruses and Malware 
  • Rice-owned Windows computers:  Trend Micro Officescan 
  • Protect personally-owned computers (Rice employees and students) before connecting to the Rice network. Several free anti-virus tools are mentioned in docs.rice.edu.
  • Rice's network is secured with Clean Access, a program that helps minimize virus contamination and quarantines infected computers.

Information Technology Security Office (ITSO)

The Information Technology Security Office protects the electronic assets of Rice University. The ITSO staff maintain information integrity, confidentiality of electronic communications, and issues that impact the security of the technology infrastructure such as virus and spam prevention, confidentiality and privacy, system intrusion detection, prevention, and forensics. The office also offers guidance and specific protection measures to the Rice community.