Information Security


The mission of the Information Security Office is to help our colleagues protect student data and maintain trust in the University.

Contact Us

Please send your security questions, consulting and operational requests by email to iso -at- Report information breaches and other urgent issues by phone at 310 506 4040.

How to protect data and preserve trust - while working remotely

Our lives and work are under stress - for safety and #efficiency, please follow these tips and call the Information Security Office with security questions...

The following tips apply to all remote computing:

Use a University owned and managed computer, when possible.

In other situations:

    • If you're using a mobile device to check email or collaborate: 
      • Apply security updates as they become available.
      • Use the native G Suite apps for #efficiency and security.
      • Be sure to set a strong PIN and lockout for failed attempts on your device.
    • If your supervisor lets you use a personally owned computer (not always appropriate):
      • Consider working on using Microsoft Remote Desktop, available for Mac or Windows. This is a campus Windows server with access to S & U drives, etc.
      • Do not save documents on your personal computer, but work directly within Pepperdine G Suite.
      • Create an account, for which only you have the password on your computer. It is NOT OK to process business or educational records on an account which is accessible to family, roommates or guests.
    • If you are storing, printing or processing RESTRICTED data (e.g. social security, customer credit card, CA driver's license or healthcare treatment info) you MUST use a University owned, PGP/SafeGuard encrypted computer. Please call our office for questions on your RESTRICTED data workflows.

Quick Links - Look Here First

  • Resources - tools you can use to secure data and systems for which you are responsible.
  • Tips - our quick reference guides and short videos to help you secure data.
  • Policy - policy, standards, guidelines and procedures to keep good intentions from turning into a bad result.
  • RESTRICTED data - if you have health records or credit card/drivers license/social security numbers find out what you need to do.

Five Ways ISO Helps You Protect Data and Preserve Trust

Pepperdine University has created the Information Security Office to assist the community in keeping our data secure. The ISO security program consists of training, consulting, policy, systems and monitoring/response activities.

1 - Training

  • Annual training events include:
    • New Student Orientation talks and welcome table in August.
    • October National Cyber Security Awareness campaign for students, faculty and staff.
    • Information Security for Managers briefing meetings on several campuses and online.
  • Training for students: An online class is available to all students on Courses.
  • Training for departments and academic divisions: An online security class is available for staff and faculty. Separately tailored 15-60 minute trainings are available for your department meeting or specific groups - call us to discuss!

2 - Consulting

  • Need to find a secure way to efficiently do your business? Start with a call to discuss, x4040.

3 - Usable policy, guidelines and standards

  • ISO doesn't make policy but we advise those that do.
  • Our goal is workable, secure policies, guidelines and standards.
  • Pepperdine has security policy comparable with the best of our peer institutions.

4 - Security systems and services (view our full service catalog)

  • Our firewalls, network access control and intrusion detection systems stop tens of thousands of attacks daily, from the Internet and devices walked onto campus nets. 
  • The spam filter stops 99+% of spam, phishing and email viruses and blocks sending RESTRICTED information. is easy to use to send RESTRICTED information or very large files securely.
  • Every computer on the network is registered and University owned servers or computers receive configuration and patch management.

5 - Monitoring & incident handling.

  • We analyze network intrusion attempts and prepare new defenses every week.
  • When there is a security incident ISO works to identify, contain and eradicate the threat and helps with restoring service and improving defenses.