IT Security Standards
Ïã½¶ÊÓÆµBoard of Regents Policy 02.07, the Ïã½¶ÊÓÆµInformation Security Program, and this body of IT Security Standards apply to the Ïã½¶ÊÓÆµSystem and all users of UA computing resources. These standards are reviewed and approved by the CIO Management Team (CMT), a system-wide governance group consisting of each university CIO, the Ïã½¶ÊÓÆµCITO, and the Ïã½¶ÊÓÆµCISO.
RECENT UPDATES | COMING SOON |
|
GENERAL IT STANDARDS
- Acceptable Use of Online Resources UPDATED
- Administrative Guidelines: Use of Email (.pdf)
- Downloading Copyrighted Materials FAQs
- Ïã½¶ÊÓÆµCloud Computing Guidelines
- Ïã½¶ÊÓÆµGuidelines for the Use of Social Media Final
- User Extensions Policy
DATA AND ADMIN STANDARDS
SECURITY STANDARDS
- Configuring SSL Securely
- Encryption Options
- Generative AI Security Standard NEW
- ID Theft Program
- Information Security Controls and Exceptions Standard NEW
- InfoSec Breach and Handling Procedure
- Information Resource Data and System Classification Standard
- Information Security Definitions & Terminology
- Minimum Security Standard for Desktop Systems
- Mobile Device Security
- Password and Authentication Standard NEW
- Remote Access Security Requirements
- Standards for System Logging
- Ïã½¶ÊÓÆµSystem Security Guidelines
- Vulnerability and Patch Management Standard NEW
PRIVACY POLICIES