In this section find security requirements and best practices for Duke computing assets including servers and end user devices, including desktops, laptops, and mobile devices. Device security includes managing the inventory of assets, managing device access, maintaining audit logs, and using security tools, such as endpoint protection tools. For protection personal devices, see the Personal Device Security Guide

Duke Health

To find Duke Health (Am I Duke Health?) security policies and standards: 

Go to Policy Tech at dukeuniversity.policytech.com. Select Duke Health enterprise and see a grouping of information security policies and standards.


Security Offices' Position Statements