Search Policies & Procedures
Displaying 1 - 29 of 29
Topic: ITS Administration | Non-Employee Access | Security and Access | Technology and Security Policies
Type: Policies
Type: Policies
Type: Policies
Type: Policies
Contents
Overview
Yale University NetID
Maintaining the Integrity of your Yale NetID and Password
How NetIDs are Created
Deactivating and Reuse of a NetID
Type: Procedures
Contents
1. Overview
2. Determine What Access is Required
3. Training and Access
Type: Procedures
Contents
1. VPN Eligibility & Access
2. Eligible Users
3. Ineligible Users
Type: Procedures
Overview
When is bypassing training acceptable?
How does the TAC request access outside of Xtrain / START?
Type: Procedures
Contents
1. Overview
2. Understanding Data Access Request Terminology
3. Attribute Release Request Requirements
4. Reporting Changes
Type: Procedures
Contents
1. Overview
2. Encryption of Data
3. Rationale for Procedures
Type: Procedures
Contents
1. Overview
2. Disposal of Paper Media
3. Re-use or Disposal of Electronic Media
Type: Procedures
Contents
1. Overview
2. Rationale for Procedure
3. Definitions
Type: Procedures
Contents
1. Overview
2. Definitions
3. Network Internet Protocol (IP) Address Security
Type: Procedures
Contents
Definitions
Sponsored Identity Appropriate Usage
Eligible Users
Ineligible Users
Requesting a Sponsored Identity
Topic: ITS Administration
Type: Procedures
Contents
1. Scope
2. Reason for this Procedure
3. Multi-Factor Authentication Process Overview
Topic: ITS Administration
Type: Procedures
Contents
Overview. 1
CAB Approval Required for ITS Systems. 1
Foundational CAB Policies. 2
Change Types for Change Management 2
Topic: ITS Administration
Type: Procedures
Introduction
Owners of non-ITS-owned or -managed configuration items are asked to report planned modifications to ITS to minimize the impact of these changes on the IT infrastructure and other systems, applications and services available at Yale.
Topic: ITS Administration
Type: Procedures
Type: Forms
Topic: HR Events | ITS Administration | Security and Access | Technology and Security Policies | Updating Employee Information
Type: Forms
Type: Forms
Contents
1. Overview
2. Special Provisions for Systems with ePHI
3. Specific Procedures for Computing Device Security
Type: Procedures