Information security policies underpin the security and well being of information resources. They are the foundation, the bottom line, of information security within any institution. The Information Security policies are formal statements that specify a set of rules that all users must follow when gaining access to UC’s information and information systems.
Policies are high-level management directives, and they are mandatory. A policy has four parts: purpose, scope, responsibilities, and compliance. The purpose will describe the need for that policy. The scope will describe what systems, people, facilities, and organizations are covered by the policy. The responsibilities are those of the information security staff, policy and management teams, and of the whole organization. In order to be in compliance, a policy will be judged on how effective it is and what happens when it is violated.
Applicable to UC
Policy Number |
Policy Name |
Link |
Status |
Policy 9.1.1 |
Data Protection Policy |
Approved |
|
Policy 9.1.2 |
Vulnerable Systems Policy |
Approved |
|
Policy 2.1.7 |
Wireless Communication Stipend Policy |
Approved |
|
N/A |
Domain Name System Policy |
Approved |
|
N/A |
Information Technology Management Policy |
Approved |
|
N/A |
Internal Mass Communications Policy |
Approved |
|
N/A |
Network Connection Policy |
Approved |
|
N/A |
Perimeter Firewall Policy |
Approved |
|
N/A |
Student E-Mail Policy |
Approved |
|
N/A |
Use of Information Technology Policy |
Approved |
|
N/A |
Web Policy |
Approved |
Applicable to UCIT
Policy Number |
Policy Name |
Link |
Status |
Policy 9.1.14 |
Privileged Access Policy |
Approved |
|
Policy 9.1.27 |
Information Security Design & Architecture Review Policy |
Approved |
|
Policy 9.1.31 |
Computer Locking Policy |
Approved |
In Process & Proposed Policies
Policy Number |
Policy Name |
Link |
Status |
Policy 9.1.7 |
Clean Desk Policy |
In Process |
|
Policy 9.1.23 |
Password Policy |
In Process |
|
Policy 9.1.25 |
Data Center Visitor Tours Policy |
In Process |
|
Policy 9.1.6 |
Acceptance of Risk Policy |
Proposed |
|
Policy 9.1.10 |
HIPAA Coverage Policy |
Proposed |
|
Policy 9.1.11 |
Information Security Emergency Response Policy |
Proposed |
|
Policy 9.1.17 |
Security Data Retention Policy |
Proposed |