Guidelines and Best Practices are recommendations. It can be a useful piece of advice, such as "To create a strong password, take the first letter of every word in a sentence, and mix in some numbers and symbols. 'You Can't Have Everything. Where Would You Put It?' becomes 'Uch3Wwup1?'" You are able to create a strong password without following this advice, which is why guidelines and best practices are not mandatory.
|Guideline Number||Guideline Name||Link|
|Guideline 9.1.1||Cloud Computing Guideline (CCG)|
|Guideline 9.1.2||Checklist for Protecting Information Guideline|
|N/A||International Travel Data and Device Guidelines|
|N/A||Information Security Policy & Compliance Framework|
|N/A||Data Security Rider|
|N/A||Waiver Certificate to Remove University of Cincinnati Owned Data from the University|