Information Security

​​We engage in the design, implementation and maintenance of security systems that protect our data against unauthorized use, disclosure, modification, damage and loss and risk assessment of technology deployed throughout the organization.

Information Security is committed to our user community by establishing approp
riate Information Security governance structure that enables collaboration and support for new information security initiatives. We proactively protect the confidentiality of data, preserve the integrity of data and promote authorized use of data only. We accomplish this by promoting security awareness, internal risk assessments, threat detection and monitoring, malware detection and much more.

Features:​
  • Security Events Support: Information Security Experts available for security events​ handling.
  • Security Reviews: Perform a risk assessment against University of California policy and standards and maintain an inventory of technologies in use.
  • Security Exceptions: Review of potential security exception requests.
Hours of Operation:
  • Standard Hours: Monday - Friday, 7:30 AM - 5:00 PM.
Request Process:
​Service Owner: Ken Wottge, Director Information Security​

Note: Additional information available in the Information Security team Pulse website (login with your Active Directory (AD) credentials).
You may also wish to review our Security Policies: