Information Security and Policy Training for ITS Staff

This is a non-technical, self-paced, online training for all UCSC ITS staff offered through the UC Learning Center. It consists of five separate videos and takes approximately 1 1/2 hours to complete all the chapters. The training covers key security and policy fundamentals including IT Service Provider responsibilities, Information Security services, sensitive data, security best practices, supplier security, and procedures for reporting security incidents.

All new ITS staff are required to complete this training within one month of their start date.

Instructions for ITS Staff: The training is available in the UC Learning Center, just click on the links below to access each chapter individually. It is recommended that you view the videos in order and complete each chapter in one sitting to receive credit for this training activity within the UC Learning Center.

Supervisors are responsible for ensuring their staff complete all assigned security training.

Please contact ispolicy@ucsc.edu for questions or additional information.

ITS Division Information Security Training

  • Chapter 1 You and Your Own Security Best Practices 
    • Video length - 14 minutes
    • Learning Objectives
      • You are a gatekeeper for security. It starts with your computer, extends to the entire network and university data. The choices and decisions you make can enhance security or compromise university resources. We’re all in this together.
      • Be your own security superhero!
      • Act with security in mind.
    • Resources and Media Credits
  • Chapter 2 Security Roles and Incident Response
    • Video length - 12 minutes
    • Learning Objectives
      • To gain awareness of previous breaches and the impact at a local, UC-wide and national level.
      • To understand the intersection and distinction between Information Security and Privacy.
      • To become aware of reported incidents at UCSC and learn how you can positively impact these numbers.
    • Resources and Media Credits
  • Chapter 5 Supplier Security
    • Video length - 9 minutes
    • Learning Objectives
      • Understand how UCSC protects our Institutional Information and IT Resources when working with third party vendors.
      • What to do about using non-UC approved software and services.
      • You are a resource for campus clients to understand supplier policies and processes.
    • Resources and Media Credits

Post-training survey and feedback form