Need Help?

By Phone Icon

By Phone

IT Service Desk »
862-4242

Hours: (M-F)
7:30am - 5pm
 
In Person Icon

In Person

IT Support Center »
Level 3, Dimond Library

See website for hours
 
Chat with IT Support

Chat with IT Support

 
On the Web Icon

On the Web

Search UNH IT»
Contact Us »

Good Practices & Procedures

"A chain is only as strong as its weakest link."  

It's an old saying but still true in our efforts at UNH to protect information and IT resources.  Each of us has a role in information protection and your use of  IT Good Practices helps you to ensure that you are armed with the knowledge to avoid basic and common risky behaviors in the use of IT resources... to avoid being the weakest link.

This ISS Good Practices page provides information, recommendations, checklists, templates and procedures for both IT Service Consumers and Service Providers.

 

Passwords

University policy requires you to change your passwords at least every six months, use strong passwords and separate passwords for each account.  You should not use the same or similar passwords on your personal accounts, for example an online banking account.  While the minimum length for university passwords is seven characters, longer, strong passwords are significantly more difficult for attackers to break.

To change your passwords, go to accounts.unh.edu and follow all the instructions.  For additional guidance, IT Signals has published the helpful How To Painlessly Change Your AD Password   If you require assistance when changing your password, contact the UNH IT Service Desk. 

Protected Computing 

A wide variety of lists of recommended practices to protect information and your computer are available and it is often confusing to know which to follow.  Reduce the risk of an information breach by following the UNH IT Protected Computing Practices 

Reducing Your Risk When Internet Browsing

Use these practices when browsing the Internet to protect  your information and computer: Reducing Your Risk

Administrator's Account

ISS recommends that all UNH computer users access the Internet only when using a non-administrative account.  This provides additional protection against downloading of malicious software such as viruses and trojans, but does not replace an up-to-date antivirus program.  For assistance with creating your non-administrative user account, contact your departmental IT support or the IT Service Desk,  or use following documents which provide guidance for a non-administrative account on your PC:

Social Media Guidelines and Good Practices

If you use social media, such as Facebook or Twitter, representing the university or your department, read the UNH Social Media Guidelines provided by University Communications and Marketing and Information Security Services. 

Email and Communications

Both IT Service Consumers and Service Providers can reduce the risk from malicious emails or other communications by using these Email Good Practices.  When sending personally identifiable information (PII) in emails, protection should be provided as recommended in PII in Email.

Servers

Good practices for computers servers can vary depending on the type of server and services in question, as well as the type of information the server stores or processes. Some basic concepts apply to all servers and this list describes some of these commonly used basic tenets. 

Printers and Copiers

Good practices for printers and copiers can vary depending on the type and manufacturer of the device, as well as the type of information the device stores or processes. This list describes good practices that apply to the installation and operation of most of these devices.   

Backup Media

Read the UNH minimum standards for handling and storage of backup media.

Mobile Device Protection

If you use a mobile device, such as a smartphone or tablet computer, to access UNH services or information, it is critical that you protect the device and the information accessed by, or stored on, the device.  For guidance, you may use the following information sources and services:  

Confidentiality Template (Employee Non-Disclosure Agreement)

Persons who handle restricted or sensitive information, or who operate IT systems that store, transfer or process such information, should sign a confidentiality agreement. Doing so helps educate those persons about protecting the systems and information, and helps to establish expectations. In some situations, the signing of a confidentiality agreement is required by policy or contract.

The confidentiality agreement template provided here is available for your use or adaptation as appropriate. Where the use of such agreement has legal implications, it is recommended that you seek legal advice to verify that your intended use is appropriate for your situation.  Download a copy of the Confidentiality Agreement Template (PDF) 

 

Return to ISS Homepage

Page last updated 11/8/2013