Ìý
IT Policies
The Office of Information Technology issues policies and guidelines that help the 51³Ô¹ÏÍø community protect their computers and the privacy of data. We encourage everyone to read through these documents to ensure they are in compliance with University policies. Please contact us if you have any questions and/or you need clarification on any of the University's policies.
You will need Adobe Acrobat Reader to read any of the PDF files below.
General University Technology Policies
51³Ô¹ÏÍø Policies and Procedures Manual Security Policies
-
University Administrative Data Systems
-
Acceptable Use of Technology Resources
-
Responsible Use of Data Access
-
Digital Millennium Copyright Act
-
Digital Millennium Copyright Act 51³Ô¹ÏÍø Designated Agent Information
-
Privacy of Electronic Communications
-
Security Awareness Training
-
System and Data Classifications
51³Ô¹ÏÍø Additional Information Security Policies
-
Information Security Policies
-
Information Security Roles and Responsibilities
-
This policy document contains the following policies:
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-1 Protecting Electronic University Data
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-2 Patching and Vulnerability Management
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-3 Virtual Private Network (VPN) and Remote Access Policy
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-4 IT Asset Inventory
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-5 Mobile Device Management
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-6 Security Event Logging
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-7 Cloud Infrastructure
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-8 Change Management and Approval
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-9 Vulnerability Scanning
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-10 Cyber-Threat Intelligence Review
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-11 Risk Assessments
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-12 Incident Response
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-13 Network Segmentation
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-14 Capacity Planning
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-15 Security Fault-Tolerance
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-16 Reporting Security Incidents
ÌýÌýÌýÌýÌýÌýÌýÌý IS-POL-17 Encryption Standards
Ìý