Policies & Standards
Policies vs. Standards vs. Procedures
Policies听are formal statements created by the university that reflect our mission, which in this case is the protection of 快活林性息鈥檚 information and assets.
Standards听are rules or actions that must be done to ensure our policies are being followed. They indicate expected behavior and must be enforced.
Procedures听are detailed step by step instructions on how to implement or adhere to the standards.
Guidelines听are recommended practices that are based on industry-standard practices.
Forms | Form Description |
---|---|
Use this form to request local administrative rights on your work desktop. | |
USB Storage Device Exception | Visit this page to learn about dangers of using USB storage devices and how to request an exception. |
Use this form for Consultants and Independent Contractors needing access to 快活林性息 systems and data. | |
Use this form for employee access to University data systems containing personal, academic, or financial information about students, faculty, staff, or alumni. | |
Faculty should use this form for employee access to University data systems containing personal, academic, or financial information about students, faculty, staff, or alumni. | |
Visit this page to learn more about 快活林性息 Financial Systems and how to request access. | |
Visit this page to learn more about Student administration and how to request access. | |
Use this form to request access HR resources such as approving time and absence. |
Access Control
Additional Resources:
- CSU Data Classification听(Level 1 vs. Level 2 vs. Level 3 data)
- 快活林性息 Information Security Plan
- Blocklists听
- Security checklist听
Cloud Policy
- 听
Old Policy No.听 | New Policy听 | Standards | Procedures, Guidelines, Executive Orders (EO),听Supplemental Policies,(SP) |
---|---|---|---|
7100 | 听 | 听 | |
8000 |
Introduction and Scope |
听 |
听 |
8005 | 听 | 听 | |
8010 |
Establishing an Information Security Program听 |
听
听 |
听 |
8015 | 听 | ||
8020 | 听 | ||
8025 | 听 | 听 | |
8030 | 听 | ||
8035 | 听 | ||
8040 |
Managing Third Parties |
听 听 听 | |
8045 |
Information Technology Security |
听 听 |
听 听 听听 听 听 |
8050 |
听 听 听 |
听听 |
|
8055 | 听 听 听 | ||
8060 | |||
8065 |
听 |
||
8070 | |||
8075 | |||
8080 | 听 | ||
8085 | 听 | ||
8090 | 听 |
听听 听 听 听 听听 |
|
8095 | 听 | 听 | |
8100 | 听 | ||
8105 | 听 | 听 |