See Support Hours
Architecture, Integration and Security (AIS) coordinates the University's technical architecture, IT standards, compliance, security, and identity and access management.
AIS works with the University community in several ways. We assist staff in making decisions that are aligned with the strategic platforms and initiatives of the University. We also help departments problem-solve and introduce them to new tools. AIS maintains extensive external professional networks, to follow or lead the development of standards, tools, and practices of relevance to the University.
AIS consists of several groups whose core functions are below:
Identity & Access Management (IAM) is the set of policies and procedures used to identify individuals and to keep track of what resources they are permitted to access. This is divided into three pieces: identification, authentication and authorization. Identification is the unique way someone’s personal identity is verified. Authentication is the ability to tell whether someone is who they say they are when they are accessing University systems. Authorization is the methods that make sure they have access to resources they’re supposed to, but not to resources they should not.
Have questions? Review our FAQ.
Data architecture is the comprehensive design of the data landscape in an organization. Data architecture is to data management what city planning is to building construction. The goal of data architecture is to introduce structure, control and consistency to the data landscape of an organization.
IT Security is charged with protecting the University's networks from malicious computer attacks, service interruptions, and network harassment. As such, IT Security works to:
Additionally, the IT Security assists with ensuring that information-related laws, regulations, and policies are adhered to in a consistent manner.
For computing guidelines and safe computing information for students and staff users, please visit our Safe Computing page. For complete contact information and PGP keys see our contact page.