Security

OpenVPN logo

The Virtual Private Network service allows you to securely access resources at UIC over a non-UIC Internet connection. While connected to the VPN, the client software works with the operating system to determine when you are accessing an Internet location that the client should protect. When you are accessing such a location, the VPN client encrypts the data.

Audience: Faculty, Staff, Students, IT

Backup services allow campus staff and faculty to protect the files stored on computers and mobile devices.  These services are designed to allow for the restoration of data in case the file is lost or the computer is damaged in some way. 

Audience: Faculty, Staff

Bluestem and Shibboleth are two single sign-on authentication methods supported at UIC.

Audience: IT

A server certificate is needed to enable secure-socket layer (SSL) operation on a server (typically a web server) which verifies the server's identity to clients (typically web browsers). To avoid warning dialogs issued by web browsers, the certificate must be digitally signed by a trusted third party, a Certificate Authority (CA) such as Comodo, VeriSign, or Thawte, whose signatures are recognized by the browser. 

Audience: Faculty, Staff

ACCC Security's mission is to protect the UIC community from active and potential security threats.

Audience: Faculty, Staff, Students, IT

There are daily data usage limitations on the use of Res-Net and the UIC public wireless networks on campus, as well as other restrictions, which are described in UIC Wireless and Res-Net Policy.

Encryption provides an easy-to-use and secure means to protect Sensitive and High Risk data on computers. Laptops and desktop computers can be lost, stolen or have hard drives removed. Many other scenarios can also jeopardize the privacy and security of your important data.   

Users with FERPA, HIPAA, intellectual property, research data, and other sensitive information can use encryption to protect their data. In many cases, encryption is required to comply with the UIC IT Security Program, legal, regulatory, or grant requirements.  

Solutions Available

There are 2 offerings within the Encryption service 

  • PGP:  PGP software provides easy-to-use and secure encryption to protect sensitive data on laptops or PCs for Faculty and Staff.
  • MBAM for Departments:  Microsoft BitLocker Administration and Monitoring provides reporting and monitoring capabilities for departments to ensure compliance of departmental assets.
Audience: Faculty, Staff, IT

Computers and other devices can be filtered and suspended from campus use for many reasons.  Computers are routinely filtered for any of the use excessive bandwidth, violation of the ACCC Acceptable Use Policy, violation of Res-Net terms of service or due to a virus or infection detected.

Audience: Faculty, Staff, Students, IT

Nessus Security and Vulnerability Scanner is a scan engine with a web-based interface that can be used to perform an external scan of your computer system. This comprehensive scan looks for potential vulnerabilities that could be used by remote attackers to control or access sensitive data on a system.  

Audience: Faculty, Staff, Students, IT

ACCC maintains and operates the StarTel campus-wide public security system. The system is best identified as the 8-foot, blue-light bollards or posts located throughout the public walkways on the East and West campus. StarTel units offer direct access to the UIC Police Department; press the red call button to call for assistance.

ACCC’s West Campus Data Center provides a server hosting environment including UPS and Generator backup power. This ACCC controlled space is operated as a university HIPAA covered entity, departmental server resource, in order to provide secure and reliable services for university servers, computing, and data applications.

Audience: Faculty, Staff, IT