IT Projects + Procedures
IT Policies + Procedures
IT Policies & Procedures
University IT Policies (for Students)
Information Technology Usage Policy.pdf
Controls Against Malicious Software.pdf
Digital Millennium Copyright Act (DMCA).pdf
University IT Policies (All)
Information Technology Usage Policy (3J.03).pdf
Information Security (3J.02).pdf
System Requirements Analysis and Specification (3J.04).pdf
Information Technology Risk Assessment (3J.05).pdf
Security Awareness (3J.07).pdf
User Identification Policy (3J.10).pdf
Controls Against Malicious Software (3J.13).pdf
Mobile Computing Devices (3J.14).pdf
Clear Desk and Clear Screen (3J.15).pdf
Information Classification (3J.17).pdf
Employee Termination and Reassignment (3J.18).pdf
Secure Disposal and Reuse (3J.19).pdf
System Documentation (3J.20).pdf
Network Logon Banner (3J.23).pdf
Disaster Recovery and Business Continuity (3J.24).pdf
Intrusion Detection (3J.25).pdf
Equipment Security (3J.26).pdf
Trust Relationships (3J.27).pdf
Please Note: Policy numbers (3J.xx) may change. For a complete, up-to-date listing of all university policies, please review University Policy Manual. IT will make every effort to ensure this page is up-to-date with accurate policy numbers.