OUHSC Information Technology Department


Home  |  Online Help  |  Policies  |  Forms  |  Tier Ones

Information Technology Policies, Standards, and Guidelines

In support of efforts to protect key University information assets, manage risk, and ensure regulatory compliance, Information Technology is overseeing development of information system security policies, standards, and procedures.

Security Policies

  1. Acceptable Use of Information Systems Policy
  2. Access to University Data Policy
  3. Active Directory Policy
  4. Activity (Log) Review Policy
  5. Antivirus Policy
  6. Business Unit Security Roles and Responsibilities Policy
  7. Compliance Sanctions Policy
  8. Computer Logoff/Lock Policy
  9. Digital Copyright Policy
  10. Electronic Data Disposal Policy
  11. Email Transmission and Use Policy (new 5//25/17)
  12. Facility Security Policy
  13. Information System and Data Classification Policy
  14. Login Banner Policy
  15. Monitoring Computer Use Policy
  16. Password Management Policy
  17. Peer-to-Peer (P2P) File Sharing Policy
  18. Policy for Mass Campus Communications
  19. Portable Computing Device (PCD) Security Policy
  20. Product Review Policy
  21. Resource and Data Recovery Policy
  22. Server Consolidation Policy
  23. Security Awareness and Training Policy
  24. Security Incident Reporting Policy
  25. Security Incident Response Policy
  26. Telework Policy
  27. Third Party E-mail Policy
  28. Transmission of Sensitive Data Policy
  29. Transportation of Media Policy
  30. Vulnerability Assessment Policy

Standards

Current Laws and Regulations

Procedures

Find Answers...

Find information on getting connected to the Internet, account questions, changing passwords, getting virus and security information, secure messaging, secure file transfer and other security related tips and services. Go to: http://it.ouhsc.edu/services/infosecurity/