Skip to content
U of T logo

Information Security

  • About
    • Meet the team
    • Strategy
  • Governance
    • Policies
    • Standards
    • Guidelines
    • Procedures
  • Resources
    • For students
    • For staff
    • For faculty
  • News & updates
  • Services
  • Programs

Experiencing phishing, fraud or another security incident?

Report an incident
U of T logo

Information Security

  • About
    • Meet the team
    • Strategy
  • Governance
    • Policies
    • Standards
    • Guidelines
    • Procedures
  • Resources
    • For students
    • For staff
    • For faculty
  • News & updates
  • Services
  • Programs
Experiencing phishing, fraud or another security incident?

Report an incident

U of T logo

Information Security

  • About
    • Meet the team
    • Strategy
  • Governance
    • Policies
    • Standards
    • Guidelines
    • Procedures
  • Resources
    • For students
    • For staff
    • For faculty
  • News & updates
  • Services
  • Programs

Experiencing phishing, fraud or another security incident? Report an incident

Site map

Home » Site map

Site map

Home » Site map

Site map

Home » Site map
  • About
    • Meet the team
    • Strategy
  • Governance
    • Policies
      • Appropriate use of information and communication technology
      • FIPP Office policies and procedures
      • Policy on Information Security and the Protection of Digital Assets
      • Policy on Information Technology
    • Standards
      • Data Classification Standard
      • Digital Asset Classification Standard
      • Information Security Control Standard
      • Information Security Incident Response Plan
    • Guidelines
      • Guidelines on using AI responsibly
      • Guidelines on privacy and security for mobile apps
      • Insider threat guidelines
      • Operational technology security guidelines
      • Vulnerability management guidelines
    • Procedures
      • Procedure for ransomware decision
  • Resources
    • Student resources
    • Staff resources
    • Faculty resources
  • News & updates
    • News & updates
    • Best practices & tips
    • Phish Bowl
    • Advisories
  • Services
    • Access group management (UTORGrouper)
    • Advanced endpoint protection
    • Enterprise Active Directory (EAD)
    • Forensic services
    • General-purpose password manager
    • Incident response
    • Information risk assessment
    • Institutional identity services (UTORauth)
    • Multi-factor authentication (UTORMFA)
    • Preferred name (display first name)
    • Privacy impact assessment
    • Research cyber risk assessments
    • Research cyber security and risk documentation
    • Research cyber security consultation
    • Research cyber security training
    • Risk guidance and general inquiries
    • Security Awareness and Training (SAT)
    • Tabletops as a service
    • TLS certificates
    • User identification (UTORid)
    • VPN and secure remote access
    • Vulnerability Management Service (VMS)
    • Weblogin
  • Programs
    • Security Awareness and Training Program (SATP)
    • Endpoint Protection Program (EPP)
    • Information Risk Management Program (IRMP)
    • Research Information Security Program (RISP)
  • Report an incident
  • Accessibility
  • Privacy
  • Enterprise Service Centre (ESC)
  • Information Security resource hub
  • Directory
  • Accessibility
  • Privacy
  • Site map
  • Website feedback form
  • Directory
  • Enterprise Service Centre (ESC)
  • Information Security resource hub
  • Information Security handbook

Statement of Land Acknowledgement

We wish to acknowledge this land on which the University of Toronto operates. For thousands of years it has been the traditional land of the Huron-Wendat, the Seneca, and the Mississaugas of the Credit. Today, this meeting place is still the home to many Indigenous people from across Turtle Island and we are grateful to have the opportunity to work on this land. Read about U of T’s Statement of Land Acknowledgement.

Page load link
Go to Top