-
To submit an Exception Request, click here .
1. Purpose and Scope
This Exception Standard outlines the process for requesting, assessing, approving, and managing risk-based exceptions to Penn policies, Wharton's Inform...
-
1. Purpose This Standard is intended to provide high-level responsibilities and timelines for Continuous Vulnerability Management and Monitoring. It addresses both Patch Management and Vulnerability Management. This standard aligns with an...
-
Essential offboarding checklist for Wharton faculty departing the school, including steps for data management, equipment return, and account transitions.
-
To ensure your laptop and mobile devices are set up according to Wharton best practices, follow the steps below. If you have questions or would prefer in-person assistance, please contact our Support team .
Faculty use the Microsoft-bas...
-
The University of Pennsylvania offers threat protection and antivirus software solutions for faculty, staff, and students for both managed and unmanaged computers. How To Protect Yourself Against Viruses Be Aware of Sites & Attachments As compu...
-
Forward suspicious emails as an attachment to security@wharton.upenn.edu . Phishing What are Phishes? Phishing emails are scams sent to you by people or programs who are looking for access to your accounts or to learn valuable informat...
-
The best way to deal with disruptive behavior in a Zoom meeting is to prevent it from happening in the first place. This article details several ways to secure your Zoom meetings and how you can quickly deal with disruptions in an active Zoo...
-
The Google Security & Privacy checkups provide a quick and effective way to ensure that your Google account is secure and private. These checklists can be used on any Google account, whether it is personal or school-provided. Google Secu...
-
This article covers the update process for Web Browsers. Faculty and Staff on Wharton-Managed Machines: Your browsers should update automatically but it's still a good idea to follow the steps listed below. Web Browsers Healthy Comput...
-
This article will give you an overview of what a firewall is, how it works, and will provide instructions on how to ensure your personal computer's firewall(s) are enabled. Faculty & Staff : Faculty and Staff using Wharton-imaged or Wharton-p...