OUHSC Information Technology Department |
IT Security policies for all users and computers These policies apply to all users and/or computers connecting to the University network including personal computers from on-campus or off-campus locations. Security Incident Reporting Policy: All suspected information security incidents must be reported promptly to the appropriate university office or party. See Incident reporting procedures. Acceptable Use of Information Systems: Acceptable use must be ethical, reflect academic honesty, and show responsible use in the consumption of shared resources.
Digital Copyright : The copying, storing, and/or providing transport of digital material in a manner which violates the copyright associated with the digital material on or through the use of any university Information System Resources is strictly prohibited. Policy for Mass Campus Communications Security Awareness and Training Policy: The University must implement a security awareness and training program for all faculty, staff and students. Training Standard : All faculty, staff, students, and volunteers must take the online security training once a year. See the Information Security Training Education and Awareness site for additional course offerings. Portable Computing Device (PCD) Security: PCDs may include handheld computers, personal digital assistants (PDAs), cell phones, laptops and more. New Laptop and USB flash drive encryption requirement beginning January 2013
Third Party E-mail: Do not access third party mail providers from the OUHSC campus network because this by-passes the university anti-virus systems. Monitoring Computer Use: While the University does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the University's computing resources require the backup and caching of data and communications, the logging of activity, the monitoring of general usage patterns, and other such activities that are necessary for providing service. Password Standards: Passwords must meet complexity requirements, be kept private and changed every six months Compliance Sanctions Policy: The University will impose appropriate sanctions for non-compliance with its information system policies, procedures, and standards. State of Oklahoma Computer Use policies Information_Security_Policy_Definitions Service Request |
|
Copyright © 2006 The Board of Regents of the University of Oklahoma, All Rights Reserved.- Disclaimer | Copyright |