OUHSC Information Technology Department


Home  |  Online Help  |  Policies  |  Tier Ones

IT Security policies for all users and computers

These policies apply to all users and/or computers connecting to the University network including personal computers from on-campus or off-campus locations.

Security Incident Reporting Policy: All suspected information security incidents must be reported promptly to the appropriate university office or party. See Incident reporting procedures.

Acceptable Use of Information Systems: Acceptable use must be ethical, reflect academic honesty, and show responsible use in the consumption of shared resources.

Desktop Computers:

  • All computers must have antivirus software installed with daily updates to virus definitions.
  • Security patches should be installed within 48 hours of release.
  • Lock or logoff when leaving computers unattended.
  • Install automated screen savers to lock computers after 15 minutes of inactivity.
  • Use the latest vendor supported operating systems: MS Windows XP Pro.

Digital Copyright : The copying, storing, and/or providing transport of digital material in a manner which violates the copyright associated with the digital material on or through the use of any university Information System Resources is strictly prohibited.

Monthly Maintenance Schedule

Policy for Mass Campus Communications

Security Awareness and Training Policy: The University must implement a security awareness and training program for all faculty, staff and students.

Training Standard : All faculty, staff, students, and volunteers must take the online security training once a year. See the Information Security Training Education and Awareness site for additional course offerings.

Portable Computing Device (PCD) Security: PCDs may include handheld computers, personal digital assistants (PDAs), cell phones, laptops and more.

New Laptop and USB flash drive encryption requirement beginning January 2013

  • PCDs that connect to the OU network or store OU data must use a logon and/or power-on password.
  • PCDs should not be used to store Sensitive Data Adobe PDF Fileunless absolutely necessary.
  • PCDs that store Sensitive Data must use encryption.
  • Appropriate physical security measures should be taken to prevent theft of PCDs and their media or data. 
    Report the theft or loss of a PCD containing Sensitive Data with this form Microsoft Word Document.

Third Party E-mail: Do not access third party mail providers from the OUHSC campus network because this by-passes the university anti-virus systems.

Monitoring Computer Use: While the University does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the University's computing resources require the backup and caching of data and communications, the logging of activity, the monitoring of general usage patterns, and other such activities that are necessary for providing service.

Password Standards: Passwords must meet complexity requirements, be kept private and changed every six months

Compliance Sanctions Policy: The University will impose appropriate sanctions for non-compliance with its information system policies, procedures, and standards.

State of Oklahoma Computer Use policiesAdobe PDF File

Information_Security_Policy_DefinitionsAdobe PDF File

Service Request
Assistance with other issues related to this service can be requested using this form. Upon submission, this form creates a record in our tracking system and it will be routed to the appropriate resource for action.