The Office of Information Security supports the CIO and the campus by leading and managing campus efforts to reduce risk. Strategies include appropriate handling of data, continued diagnostics, cybersecurity awareness training, and good processes and procedures to manage our intellectual property and other sensitive information. Trinity College’s computing resources are for the use of Trinity College students, faculty, and staff, and are to be used only for the academic, educational, and research purposes of the College. It is your responsibility to know and adhere to the Acceptable Use Policy.

Your Trinity Account

Your Trinity account is for your personal use only. Never share your password (not even with your family). Your Trinity username requires a password reset every 120 days. Learn how to set a strong password.

Data Security

You are responsible for any college data stored on your computer. There are a number of steps you must take to protect this data, including those that have been outlined in College policies regarding the protection of confidential data. It is also important to back up data that only exists on your computer and physically secure your laptop or device.

Computer Security

Library and Information Technology Services is committed to helping faculty, staff and students protect their computers and information from viruses and spyware. Find out about getting virus protection, removing spyware and malware, practicing conscientious downloading, and protecting against phishing attempts.

Cybersecurity Awareness Program

Everyone at Trinity utilizes technology to some degree in their daily lives, but there are always cybercriminals out there attempting to compromise our computers, accounts, and personal information. To that end, we selected a curriculum from SANS Security Awareness to inform you of the steps that you can take to protect yourself, your family, and Trinity College from malicious cyber activity.

Information Security Breach Procedure

Information security incidents or breaches are events that could have an adverse effect on the confidentiality, integrity, or availability of information resources at Trinity. Resources could be things like data, individual computers, servers, media, and mobile devices, as well as, spoken information and constituents. If you see or hear something that doesn’t seem right, tell