These links and documents include the university’s security goals and objectives. Specific requirements or rules are outlined, along with common and proprietary IT security practices that are in general use today. Additional documents, containing security related information, are available here.
These are high-level statements of the university’s goals and objectives with the intent to be long-lasting. They outline specific requirements or rules that must be met.
These are mandatory rules of measure; collections of system-specific or process-specific requirements that must be met. Standards are designed to provide policies with the support structure and specific direction they require to be meaningful and effective.
These are recommended models or general statements designed to achieve policy objectives by providing a framework for developing or implementing procedures, processes, or practices; guidelines may utilize or refer to standards.
Security References and Information Technology-related policies from the Handbook of Operating Procedures:
1.7 STANDING COMMITTEES
4.4 BACKGROUND INFORMATION CHECKS
4.5 EMPLOYMENT ADMINISTRATION
4.7 WORK AND LEAVE ADMINISTRATION
4.10 EMPLOYEE DEVELOPMENT AND TRAINING
5.2 SYSTEMS AND NETWORK OPERATIONS
5.4 EDUCATIONAL MEDIA RESOURCES
5.5 INFORMATION MANAGEMENT CLIENT SUPPORT SERVICES
5.8 INFORMATION SECURITY
8.6 STUDENT RIGHT-TO-KNOW AND CAMPUS SECURITY ACT
8.7 UNIVERSITY POLICE
10.1 ETHICS, STANDARDS OF CONDUCT, AND RELATIONSHIPS WITH EXTERNAL ENTITIES
11.1 GENERAL AND OVERSIGHT POLICIES
12.1 TECHNOLOGY DEVELOPMENT
Contact Infosec directly at 210-567-0707 or email@example.com