Information Security
These policies and procedures have been developed, with broad representation from the campus community, to assure that University data assets are secure and protected in compliance with state and federal regulations.
- Cloud computing rules
Appropriate and approved use of cloud computing - Credential Management Rule
- Data access policies
Policies and request forms for gaining access to secure information - Data classification policy
Foundation for 蜜桃社区's data classification policies - Data Collection Through Surveys Policy
- Data security responsibilities
What you should know and do about data security - Data wiping policy
Required before cascading or discarding equipment - E-Commerce
Electronic commerce at 蜜桃社区 - European Union privacy regulation
- External Release of University Information Policy
- Family Education Rights and Privacy Act (FERPA)
- HIPAA and Security of Electronic PHI
- Information Security Incident Response
- Information security incident response procedure
Breach of security in the handling of confidential/restricted University data - Information security incident response team
Composition and responsibilities of the Incident Response team member - Information Technology Acquisition Policy
- Gramm-Leach-Bliley compliance
Protecting customer's privacy - Lost or stolen device procedure
How to proceed if a device containing University data is lost or stolen - Mobile device security policy
Policies for mobile computing security - Payment Card Industry data security
Technical response for handling credit card payments at 蜜桃社区 - Remote access policy
Security requirements for accessing 蜜桃社区 data remotely - Secure Computing Facility Access Rule
- Social Security Number Policy
Policies and guidelines to help keep your digital identity safe.
- Password guidelines
Guidelines for creating and using a secure password - Password policy
Policy for establishing passwords at 蜜桃社区 - European Union privacy regulation
- Password guidelines