Information Technology Policies, Standards, and Guidelines
In support of efforts to protect key University information assets, manage risk, and ensure regulatory compliance, Information Technology is overseeing development of information system security policies, standards, and procedures.
Security Policies
- Acceptable Use of Information Systems Policy (new 5/5/20)
- Access to University Data Policy
- Activity (Log) Review Policy
- Business Unit Security Roles and Responsibilities Policy
- Compliance Sanctions Policy
- Confidential Research and Publications Policy- 2020 (new 5/29/20)
- Cybersecurity Incident Reporting and Response Policy
- Digital Copyright Policy
- Electronic Data Disposal Policy
- Email Transmission and Use Policy
- Facility Security Policy
- Information Protection Policy- 2020 (new 5/29/20)
- Information Security Policy and Standard Lifecycle
- Information System and Data Classification Policy
- Information System Data in Motion Policy
- Information System Storage and Data Sharing Policy
- IT Change Management Policy
- Monitoring Computer Use Policy
- Password Management Policy
- Policy for Mass Campus Communications
- Portable Computing Device (PCD) Security Policy
- Information Security Risk Assessment (formerly Product Review) Policy
- Resource and Data Recovery Policy
- Security Awareness and Training Policy
- Third Party E-mail Policy
- Vulnerability Management Policy
Find Answers...
Find information on getting connected to the Internet, account
questions, changing passwords, getting virus and security information,
secure messaging, secure file transfer and other security related tips
and services. Go to: http://it.ouhsc.edu/services/infosecurity/