New Articles

  1. Data Classification and Management Standard

    1. Penn Data Classification The Penn Data Classification framework categorizes university data into three levels based on sensitivity and potential impact if exposed or misused.  However, Wharton refines the Moderate Risk category into tw...
  2. Identity and Access Management Standard

    1. Purpose and Scope  The purpose of this document is to establish the Identity and Access Management (IAM) Standard at Wharton. It aims to protect school resources, ensure secure access to systems, and maintain compliance with applicable r...
  3. Slack Guidelines

    Slack is a powerful tool for workplace communication and collaboration. However, proper usage is essential to ensure professional, secure, and efficient interactions. Follow these guidelines to make the most of Slack while maintaining compliance...
  4. Exception Standard

    To submit an Exception Request, click here . 1. Purpose and Scope   This Exception Standard outlines the process for requesting, assessing, approving, and managing risk-based exceptions to Penn policies, Wharton's Inform...
  5. Vulnerability Management Standard

    1. Purpose  This Standard is intended to provide high-level responsibilities and timelines for Continuous Vulnerability Management and Monitoring. It addresses both Patch Management and Vulnerability Management. This standard aligns with an...
  6. Faculty Offboarding To-Do List

    Essential offboarding checklist for Wharton faculty departing the school, including steps for data management, equipment return, and account transitions.
  7. Faculty Whartonization Guide

    To ensure your laptop and mobile devices are set up according to Wharton best practices, follow the steps below. If you have questions or would prefer in-person assistance, please contact our Support team . Faculty use the Microsoft-bas...
  8. Virus and Threat Protection at Wharton

    The University of Pennsylvania offers threat protection and antivirus software solutions for faculty, staff, and students for both managed and unmanaged computers. How To Protect Yourself Against Viruses Be Aware of Sites & Attachments As compu...
  9. Phishing and Spam at Wharton

    Phishing What are Phishes? Phishing emails are scams sent to you by people or programs who are looking for access to your accounts or to learn valuable information about you. They often appear to be from an administrator of the ema...
  10. Zoom Meeting Security

    The best way to deal with disruptive behavior in a Zoom meeting is to prevent it from happening in the first place. This article details several ways to secure your Zoom meetings and how you can quickly deal with disruptions in an active Zoom meet...