Campus Safety Advisory

EMU Police are investigating unconfirmed reports regarding two individuals walking together on campus, one of whom is reported to be carrying a long gun. EMU Police are actively patrolling campus. If you observe suspicious activity, call 911 or EMU Police at 734-487-1222. As soon as we have additional information, we will share it with you. 

Eastern Michigan University

Virtru Email Encryption

Virtru is an email and file encryption tool that will help you protect sensitive information shared in email messages.  With Virtru, EMU users can send and read encrypted messages and attachments without ever leaving your inbox---and without your recipients downloading any software or creating any passwords.  

In addition to its ease of use, it will also allow EMU to:

  1. Meet compliance requirements and avoid potential penalties.
  2. Reduce the risk of data breaches.
  3. Have the freedom to collaborate with confidence and productively share data appropriately.
  4. Maintain control of our data, and see who’s accessing and interacting with it.

Examples of Virtru Uses

  • EMU employee discusses confidential or sensitive information via email with another employee.
  • An authorized EMU employee securely emails a file containing PII data to an approved vendor to meet contractual requirements. 
  • EMU employees authorized to handle sensitive data can collaborate securely with other employees, students or other stakeholders.


Please note:  All Board of Regents and I.T. policies listed below are now available in  EMU PolicyTech.  

  • EMU BOARD OF REGENTS POLICY 8.2 Access to Student Records 
  • EMU BOARD OF REGENTS POLICY 15.2 Information Technology Security and Confidentiality 
  • EMU I.T. POLICY 7.1 Statement of Confidentiality
  • EMU I.T. POLICY: 7.3 Privacy and Monitoring of Electronically-Stored Records
  • EMU I.T. POLICY 8.2 Acceptable Encryption
  • EMU I.T. POLICY 8.10 Data Encryption
  • EMU I.T. POLICY 8.11 Security Configuration Standards for non-IT Managed Systems
  • EMU I.T. POLICY 8.15 Access Control
  • EMU I.T. PROCEDURE 8.15.P.1 Access Control - DoIT Systems Privileged Access Request
  • EMU I.T. PROCEDURE 8.15.P.2 Access Control - DoIT Systems Privileged Access Termination
  • EMU I.T. PROCEDURE 8.15.P.3 Identification of Anomalous Login Activity
  • EMU I.T. POLICY 8.16 Information Security Program

Additional Resources

Using Virtru

The permitted (Yes), the not permitted (No), and those needing to contact I.T. (Contact I.T.) are listed in three columns in the matrix below.


Note:  Don't see what you need? Email the I.T. Security Team at [email protected] .