Information Technology - Volume 5
This volume contains policies and procedures related to the technological environment. Subjects covered include privacy, security and responsible use of information technology resources, and policies that affect computer networks, e-mails, online course management, computer labs, help desk, software, and hardware.
5.0 User Accounts
5.01 Downtime
5.02 Computer Passwords
5.03 Computer Equipment Purchases and Scheduled Replacement
5.04 Vulnerability and Risk Assessment
5.05 Responsible Use of University Computing Resources
5.06 Copyright and Peer-to-Peer File Sharing
5.09 Data Security and Classification
5.10 GLBA Policies
5.10.1 Change and Patch Management Policy
5.10.2 Multi-Factor Authentication Policy
5.10.3 Information Security Employee Training Policy
5.10.4 Vendor Management Policy
Legacy Policies
L.02 Software Policy