OUHSC Information Technology Department


Home  |  Online Help  |  Policies  |  Forms  |  Tier Ones

Information Technology Policies, Standards, and Guidelines

In support of efforts to protect key University information assets, manage risk, and ensure regulatory compliance, Information Technology is overseeing development of information system security policies, standards, and procedures.

Security Policies

  1. Acceptable Use of Information Systems Policy
  2. Access to University Data Policy
  3. Activity (Log) Review Policy
  4. Business Unit Security Roles and Responsibilities Policy
  5. Compliance Sanctions Policy
  6. Cybersecurity Incident Reporting and Response Policy (new 04/24/2018)
  7. Digital Copyright Policy
  8. Electronic Data Disposal Policy
  9. Email Transmission and Use Policy (new 5//25/17)
  10. Facility Security Policy
  11. Information System and Data Classification Policy
  12. Information System Data in Motion Policy (new 03/06/2018)
  13. IT Change Management Policy (new 05/08/2018)
  14. Monitoring Computer Use Policy
  15. Password Management Policy
  16. Peer-to-Peer (P2P) File Sharing Policy
  17. Policy for Mass Campus Communications
  18. Portable Computing Device (PCD) Security Policy
  19. Information Security Risk Assessment (formerly Product Review) Policy
  20. Resource and Data Recovery Policy
  21. Server Consolidation Policy
  22. Security Awareness and Training Policy
  23. Third Party E-mail Policy
  24. Vulnerability Management Policy

Standards

Current Laws and Regulations

Procedures

Find Answers...

Find information on getting connected to the Internet, account questions, changing passwords, getting virus and security information, secure messaging, secure file transfer and other security related tips and services. Go to: http://it.ouhsc.edu/services/infosecurity/