Ìý
IT Policies
The Office of Information Technology issues policies and guidelines that help the ¹ú²ú×ÔÅÄ community protect their computers and the privacy of data. We encourage everyone to read through these documents to ensure they are in compliance with University policies. Please contact us if you have any questions and/or you need clarification on any of the University's policies.
You will need Adobe Acrobat Reader to read any of the PDF files below.
General University Technology Policies
¹ú²ú×ÔÅÄ Policies and Procedures Manual Security Policies
-
University Administrative Data Systems
-
Acceptable Use of Technology Resources
-
Responsible Use of Data Access
-
Digital Millennium Copyright Act
-
Digital Millennium Copyright Act ¹ú²ú×ÔÅÄ Designated Agent Information
-
Privacy of Electronic Communications
-
Security Awareness Training
-
System and Data Classifications
¹ú²ú×ÔÅÄ Additional Information Security Policies
-
Information Security Policies
-
Information Security Roles and Responsibilities
-
This policy document contains the following policies:
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-1 Protecting Electronic University Data
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-2 Patching and Vulnerability Management
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-3 Virtual Private Network (VPN) and Remote Access Policy
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-4 IT Asset Inventory
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-5 Mobile Device Management
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-6 Security Event Logging
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-7 Cloud Infrastructure
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-8 Change Management and Approval
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-9 Vulnerability Scanning
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-10 Cyber-Threat Intelligence Review
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-11 Risk Assessments
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-12 Incident Response
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-13 Network Segmentation
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-14 Capacity Planning
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-15 Security Fault-Tolerance
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-16 Reporting Security Incidents
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-17 Encryption Standards
Ìý