Skip to Main Content
Systems that might be targets of special interest to hackers because of the information they contain or the resources they control need special protections. This category includes systems containing high-risk confidential information and facility access or control systems as well as systems containing valuable research data.
HLS has several methods of protecting target machines. The methods and technical mechanisms vary depending upon the classification of data. HLS ITS will work proactively with data owners to secure data and target systems with correct level of physical and logical security.
Contact Security(@law.harvard.edu) for additional assistance.
Back to Top