IT Security Standards
°ÅÀÖÊÓÆµBoard of Regents Policy 02.07, the °ÅÀÖÊÓÆµInformation Security Program, and this body of IT Security Standards apply to the °ÅÀÖÊÓÆµSystem and all users of UA computing resources. These standards are reviewed and approved by the CIO Management Team (CMT), a system-wide governance group consisting of each university CIO, the °ÅÀÖÊÓÆµCITO, and the °ÅÀÖÊÓÆµCISO.
RECENT UPDATES | COMING SOON |
|
GENERAL IT STANDARDS
- Acceptable Use of Online Resources UPDATED
- Administrative Guidelines: Use of Email (.pdf)
- Downloading Copyrighted Materials FAQs
- °ÅÀÖÊÓÆµCloud Computing Guidelines
- °ÅÀÖÊÓÆµGuidelines for the Use of Social Media Final
- User Extensions Policy
DATA AND ADMIN STANDARDS
SECURITY STANDARDS
- Configuring SSL Securely
- Encryption Options
- Generative AI Security Standard NEW
- ID Theft Program
- Information Security Controls and Exceptions Standard NEW
- InfoSec Breach and Handling Procedure
- Information Resource Data and System Classification Standard
- Information Security Definitions & Terminology
- Minimum Security Standard for Desktop Systems
- Mobile Device Security
- Password and Authentication Standard NEW
- Remote Access Security Requirements
- Standards for System Logging
- °ÅÀÖÊÓÆµSystem Security Guidelines
- Vulnerability and Patch Management Standard NEW
PRIVACY POLICIES