These information security policies, standards, and guidelines provide the minimum requirements for the Wharton community to:
- Enable the mission of the school.
- Increase trust and reduce risk.
- Address regulatory and legal requirements.
Report a Security Incident
If you suspect a security incident such as a phishing attempt, data breach, or compromised account, contact us immediately.
Information Security Policies
Policies form the cornerstone of Wharton’s information security governance, outlining our approach to managing security and risk. They establish clear expectations for all members of the Wharton community regarding the safeguarding of sensitive information and digital assets.
Information Security Policy
Wharton policy
Privacy Policy
Penn policy
Privacy in the Electronic Environment
Penn policy
Information Security Standards
Standards at Wharton define the minimum requirements for protecting information and digital assets. Every member of the Wharton community is responsible for understanding and applying these standards, which serve to operationalize security policies and ensure consistent protection.
Vulnerability Standard
Wharton standard
Security Impact Analysis
Wharton standard
Travel Standard
Wharton standard
Change Enablement Standard
Wharton standard
IAM Standard
Wharton standard
IT Network Standards
Penn standard
Information Security Guidelines
Guidelines provide recommended best practices aligned with Wharton’s information security standards. They offer actionable advice to the Wharton community on effectively implementing measures that reduce security risks and enhance digital asset protection.
Information Security Best Practices
Penn guidelines
Password Handling
Penn guidelines
AI Guidance
Penn guidelines
Guidelines for the Use of Social Media at Penn
Penn guidelines
Protecting Penn Data
Penn guidelines
Guidelines for the Use of Social Media at Penn
Penn guidelines