Be cautious when using your university credentials. Never approve a request from Duo for multi-factor authentication (MFA) into university resources unless you requested access.Phishing Alert Message
Third party vendors are now subject to the same Security Rule requirements as Covered Entities, and are also subject to relevant sections of the Privacy Rule and the HITECH Breach Notification Rule. In order to protect university confidential and highly confidential data, including PHI, the risk and compliance team assesses the security and practices of all third party vendor server applications and cloud services. Third party vendor applications include those that process, transmit or store PCI (Payment Card Industry) data.
Third party vendors must:
Learn more about the assessment process. Reach out to the Risk and Compliance (RAC) team to determine if an application is approved for use.