Information Technology University-Wide Policy Documents

Technology & Security

Document Type Numbersort descending Extension Documents Revision Date
Policies 1010 Training and Other Requirements September 12, 2016
Procedures 1104 PR.02 Reviewing User Access Security and Review Procedures April 23, 2013
Policies 1109 Internet Access from Home April 21, 2008
Guides 1601 GD.05 Effective Practices for Monitoring Security and Access August 15, 2013
Forms 1601 FR.01 VPN Access Exception Request July 27, 2018
Forms 1601 FR.02 Identity and Access Management (IAM) October 23, 2018
Forms 1601 FR.05 Workday Matrix Organization Creation May 15, 2017
Forms 1601 FR.06 Workday Supervisory Organization Creation June 22, 2017
Procedures 1601 PR.08 Sponsored Identity Access May 16, 2018
Forms 1601 FR.07 Workday Supervisory Organization Change June 22, 2017
Forms 1601 FR.08 Workday Reorganization Request May 15, 2017
Procedures 1601 PR.01 Access to Oracle Financial and Human Resources Applications January 27, 2009
Procedures 1601 PR.02 NetIDs and Identity Management June 29, 2017
Procedures 1601 PR.03 Access Control for Protected Health Information (PHI) April 20, 2005
Policies 1601 Information Access and Security April 16, 2013
Procedures 1601 PR.04 VPN Eligibility & Access Procedure July 2, 2017
Procedures 1601 PR.06 Bypassing Oracle Applications and Financial Planning Training May 28, 2002
Procedures 1601 PR.07 Identity Data Access Requests June 21, 2017
Policies 1602 Protecting the Security and Con´Čüdentiality of Social Security Numbers October 1, 2008
Policies 1603 Red Flags Policy August 13, 2013
Policies 1604 Data Classification Policy January 12, 2018
Procedures 1604 PR.01 Data Classification Procedure January 12, 2018
Policies 1605 Web Accessibility Policy March 1, 2018
Procedures 1605 PR.01 Web Accessibility Procedure March 1, 2018
Policies 1607 Information Technology Appropriate Use Policy May 20, 2011
Procedures 1607 PR.01 Endorsed Encryption Implementation Procedure December 16, 2014
Policies 1608 Mobile Device Management Policy December 9, 2014
Procedures 1608 PR.01 Security Standards for Mobile Devices and External Devices September 4, 2014
Policies 1609 Media Control September 13, 2010
Procedures 1609 PR.01 Disposal of Media Containing Confidential or Protected Health Information March 1, 2018
Policies 1610 Systems and Network Security January 11, 2017
Procedures 1610 PR.01 Systems and Network Security June 10, 2011
Guides 1610 GD.01 Selecting Good Passwords April 13, 2007
Procedures 1610 PR.02 Disposal of Obsolete Computers and Peripherals March 1, 2018
Procedures 1610 PR.03 Network Configuration Security September 8, 2014
Procedures 1610 PR.04 Multifactor Authentication November 4, 2015
Procedures 1610 PR.05 Device Security Standards April 19, 2016
Guides 1610 GD.02 Device Configuration Guidelines May 18, 2016
Policies 1611 Program for the Security of Customer Financial and Related Data January 31, 2014
Policies 1612 Software Licensing July 1, 2013
Policies 1613 Electronic Signatures and Records December 9, 2014
Procedures 1613 PR.01 Electronic Signatures December 9, 2014
Policies 1614 Vulnerability Management March 31, 2015
Procedures 1614 PR.01 Vulnerability Management Procedures March 31, 2015
Policies 1615 Information Technology Infrastructure and Applications Change Management Policy April 17, 2015
Procedures 1615 PR.01 Information Technology Infrastructure and Application Change Management April 17, 2015
Procedures 1615 PR.02 Change Notification Standards for Non-ITS-managed Configuration Items April 17, 2015