IT Security Policies, Procedures, and Guidelines

For Students, Faculty, Staff, Guests, Alumni

This repository contains the IT Security's policies, procedures, and guidelines regarding technology resources and services. The Office of Information Technology provides resources and services to advance the University's educational, research, and business objectives. Access to or using IT Resources that interfere, interrupt, or conflict with these purposes is unacceptable. These documents provide notice of the University's expectations to all who use and manage services, including, but not limited to, computing, networking, communications, application, telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials.

Deviations from policies, procedures, or guidelines published and approved by Information Security and Assurance (ISA)  may only be done cooperatively between ISA and the requesting entity with sufficient time to allow for appropriate risk analysis, documentation, and possible presentation to authorized University representatives. Failure to adhere to ISA written policies may be met with University sanctions.

IT Security Policies

IT Security Procedures

Need Help?


Walk-In Centers

McShane Center 266 | RH
Leon Lowenstein SL18 | LC

View Our Walk-In Hours