OUHSC Information Technology Department


Home  |  Online Help  |  Policies  |  Forms  |  Tier Ones

Information Technology Policies, Standards, and Guidelines

In support of efforts to protect key University information assets, manage risk, and ensure regulatory compliance, Information Technology is overseeing development of information system security policies, standards, and procedures.

Security Policies

  1. Acceptable Use of Information Systems Policy
  2. Access to University Data Policy
  3. Activity (Log) Review Policy
  4. Business Unit Security Roles and Responsibilities Policy
  5. Compliance Sanctions Policy
  6. Cybersecurity Incident Reporting and Response Policy
  7. Digital Copyright Policy
  8. Electronic Data Disposal Policy (Updated 11/13/2018)
  9. Email Transmission and Use Policy
  10. Facility Security Policy
  11. Information Security Policy and Standard Lifecycle (New 11/13/2018)
  12. Information System and Data Classification Policy
  13. Information System Data in Motion Policy
  14. Information System Storage and Data Sharing Policy (New 11/13/2018)
  15. IT Change Management Policy
  16. Monitoring Computer Use Policy
  17. Password Management Policy
  18. Policy for Mass Campus Communications
  19. Portable Computing Device (PCD) Security Policy (Updated 11/13/2018)
  20. Information Security Risk Assessment (formerly Product Review) Policy
  21. Resource and Data Recovery Policy
  22. Security Awareness and Training Policy
  23. Third Party E-mail Policy
  24. Vulnerability Management Policy

Standards

Current Laws and Regulations

Procedures

Find Answers...

Find information on getting connected to the Internet, account questions, changing passwords, getting virus and security information, secure messaging, secure file transfer and other security related tips and services. Go to: http://it.ouhsc.edu/services/infosecurity/