OUHSC Information Technology Department


Home  |  Online Help  |  Policies  |  Forms  |  Tier Ones

Information Technology Policies, Standards, and Guidelines

In support of efforts to protect key University information assets, manage risk, and ensure regulatory compliance, Information Technology is overseeing development of information system security policies, standards, and procedures.

Security Policies

  1. Acceptable Use of Information Systems Policy
  2. Access to University Data Policy
  3. Active Directory Policy
  4. Activity (Log) Review Policy
  5. Antivirus Policy
  6. Business Unit Security Roles and Responsibilities Policy
  7. Compliance Sanctions Policy
  8. Computer Logoff/Lock Policy
  9. Digital Copyright Policy
  10. Electronic Data Disposal Policy
  11. Facility Security Policy
  12. Information System and Data Classification Policy
  13. Login Banner Policy
  14. Monitoring Computer Use Policy
  15. Password Management Policy
  16. Peer-to-Peer (P2P) File Sharing Policy
  17. Policy for Mass Campus Communications
  18. Portable Computing Device (PCD) Security Policy
  19. Product Review Policy
  20. Resource and Data Recovery Policy
  21. Server Consolidation Policy
  22. Security Awareness and Training Policy
  23. Security Incident Reporting Policy
  24. Security Incident Response Policy
  25. Telework Policy
  26. Third Party E-mail Policy
  27. Transmission of Sensitive Data Policy
  28. Transportation of Media Policy
  29. Vulnerability Assessment Policy

Standards

Current Laws and Regulations

Procedures

Find Answers...

Find information on getting connected to the Internet, account questions, changing passwords, getting virus and security information, secure messaging, secure file transfer and other security related tips and services. Go to: http://it.ouhsc.edu/services/infosecurity/