About UI IT Policies | IT Policy Process | Best Practices | Policy Feedback Form
IT Policy Digest
Policy Number |
Policy Name |
Operations Manual - Section II, Chapter 19 |
Acceptable Use of Information Technology Resources |
Operations Manual - Section II, Chapter 36 |
Social Security Numbers |
Operations Manual - Section II, Chapter 45 |
Video Surveillance Policy |
IT - 01 |
Network Vulnerability Scanning and Penetration Testing |
IT - 02 |
Enterprise Active Directory |
IT - 05 |
Enterprise Password |
IT - 06 |
IT Security Incident Escalation |
IT - 07 |
UI Residence Halls Network (ResNet) |
IT - 08 |
Network Citizenship |
IT - 09 |
Mass E-Mail Mailings |
IT - 10 |
Domain Name Policy |
IT - 12 |
Email Addresses |
IT - 15 |
Enterprise Authentication |
IT - 16 |
Roles and Responsibilities for Information Security |
IT - 17 |
Backup and Recovery Policy |
IT - 18 |
Information Security Framework Policy |
IT - 19 |
Institutional Data Access Policy |
IT - 20 |
Airspace Policy |
IT - 21 |
Computer Data and Media Disposal Policy |
IT - 23 |
Computer Security Breach Notification |
IT - 24 |
Wireless Networking Policy |
IT - 25 |
Network Address Allocation Policy for IPv4 |
IT - 26 |
Web Accessibility Policy |
IT related Business policies |
Computer Inventory and Internal Control Policy |
IT related Business policies |
Credit Card Acceptance and Security Policy |
IT related Business policies |
Identity Theft Prevention Program |
IT Standards Digest
Standard Number |
Standard Name |
IT - STANDARD: 02 |
Enterprise Login ID Standard (HawkID) |
IT - STANDARD: 05 |
Computer Security Standard |
IT - STANDARD: 22 |
University ID Number Standard |
Policy Drafts
Policy Draft Number |
Policy Draft Name |
|
|