Policy Title | Interim Information Technology Policy |
---|---|
Policy Category | Information Technology |
Policy Approval Date | March 29, 2017 |
Policies Superseded | None |
Responsible Office | Finance |
Related Policies | |
Frequency of Review | 3 Years |
Date of Revision |
I. Scope
This Interim Information Technology Policy (“Policy”) applies to all members of the University Community, as well as, contractors, consultants and all personnel affiliated with third parties using VPN’s to access the University network. See Section IV for the definitions of all capitalized terms found in this Policy
II. Policy Statement
This document outlines the University’s interim policy regarding Information Technology and articulates the University’s vision as it relates to the use of information technology resources, specifies requirements and standards for the consistent use of IT resources throughout the University, and interprets applicable laws and regulations to ensure our use is consistent with legal requirements.
Non-substantive change made to section J. on March 12, 2020.
Non-substantive change made to section X. on August 12, 2020.
III. Policy
Index
I. SCOPE
II. POLICY STATEMENT
III. POLICY
A. ACCOUNTS MANAGEMENT
B. SERVER PATCH MANAGEMENT
C. IT LOANER EQUIPMENT
D. INFORMATION SECURITY PROGRAM
E. NETWORK DEVICE BACKUP
F. NETWORK DATA BACKUP
G. DESKTOP AND LAPTOP COMPUTER REPLACEMENT & SUPPORT
H. DATA CLASSIFICATION
I. ELECTRONIC MAIL
J. REMOTE ACCESS (VPN)
K. ENCRYPTION
L. DIGITAL MILLENIUM COPYRIGHT ACT
M. PASSWORD CHANGE
N. SECURITY INCIDENT RESPONSE
O. ANTI-VIRUS GUIDELINES
P. COPYRIGHT AND INTELLECTUAL PROPERTY
Q. IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULE)
R. WIRELESS NETWORK
S. IT/ATS SUPPORTED RESOURCES
T. DATA ACCESS CONTROL
U. ACQUISITION AND DISPOSAL OF TECHNOLOGY RESOURCES
V. INSTITUTIONAL DATA SECURITY
W. PROTECTION OF CONSUMER FINANCIAL INFORMATION
X. SOCIAL MEDIA
Y. UNIVERSITY WEB PRESENCE
Z. MANAGEMENT AND USE OF MOBILE DEVICES
AA. CLOUD COMPUTING
BB. WIRELESS ACCESS POINTS
CC. PEER TO PEER FILE SHARING
DD. ELECTRONIC PRIVACY STATEMENT
EE. RECORD RETENTION
FF. LEGAL HOLD RELEASE
IV. DEFINITIONS
V. ENFORCEMENT
VI. EFFECTIVE DATE
VII. SIGNATURE, TITLE, AND DATE OF APPROVAL