Security and Compliance

Protecting your data, your devices, and the university’s digital environment.

Categories (1)

IT Compliance Support and Training

Our IT Compliance Services help departments meet regulatory, contractual, and university technology standards through expert guidance, reviews, and training.

Services (14)

Antivirus: Microsoft Defender

We use Microsoft Defender to help protect university‑owned Windows, Mac, and Linux computers from security threats. Microsoft Defender is automatically installed and managed on all university‑managed devices, so your system stays protected without you needing to take any action.

Badging Services for ISS Spaces

Request badge access to ISS and Denver OIT managed spaces on campus. Exclusive to ISS and Denver OIT spaces only. See the campus badging or facilities offices for all other access requests.

Contract Compliance Review

Request a review of contracts and agreements to ensure they meet information technology security, privacy, and compliance requirements and align with university standards.

Data Access Request

Supervisors and managers may request authorized access to institutional data for an employee when access is required for business or compliance purposes.

Digital Certificate Management

Digital Certificate Management provides secure issuance, renewal and revocation of digital certificates to ensure secure communications and authentication across systems and applications.

Email Quarantine: Microsoft Defender

Get help understanding and managing emails that are held in quarantine to protect you from phishing, spam, and other potentially harmful messages.

Network Firewall Management

Network Firewall Management is the configuration, monitoring, and maintenance of network firewalls to ensure secure and compliant controls are implemented across our network.

Password Manager: 1Password

1Password manages the secure storage and retrieval of passwords and credentials for university IT professionals.

Payment Card Compliance

Departments accepting payments from credit or debit cards need to meet certain compliance requirements. Request support for payment card activities for merchants, including onboarding new merchants, completing procurement card scans, and receiving guidance to meet and maintain procurement card compliance requirements.

Remote Access: VPN

Submit requests for new VPN access, or get help diagnosing and resolving any problems with your VPN connection to ensure secure remote access.

Report a Lost, Stolen or Missing Device

Quickly report any missing or stolen university devices to ensure prompt action and security.

Technology Risk Assessment

Request a technology risk assessment to evaluate security and compliance risks for applications, services, or research related technologies that involve university data.

Timely Termination

Ensure timely termination of access for departing employees to maintain information security and compliance.

Vulnerability Assessment and Remediation

Vulnerability Asset and Remediation conducts regular vulnerability scans and assessments, providing actionable insights and remediation plans to address security weaknesses to university IT professionals.