IT Security Standards
UA Board of Regents Policy 02.07, the UA Information Security Program, and this body of IT Security Standards apply to the UA System and all users of UA computing resources. These standards are reviewed and approved by the CIO Management Team (CMT), a system-wide governance group consisting of each 猫咪社区官网 CIO, the UA CITO, and the UA CISO.
RECENT UPDATES | COMING SOON |
|
GENERAL IT STANDARDS
- Acceptable Use of Online Resources policy
- Administrative Guidelines: Use of Email (.pdf)
- Downloading Copyrighted Materials FAQs
- UA Cloud Computing Guidelines
- UA Guidelines for the Use of Social Media Final
- User Extensions Policy
DATA AND ADMIN STANDARDS
SECURITY STANDARDS
- Configuring SSL Securely
- Encryption Options
- ID Theft Program
- Information Security Controls and Exceptions Standard NEW
- InfoSec Breach and Handling Procedure
- Information Resource Data and System Classification Standard
- Information Security Definitions & Terminology
- Minimum Security Standard for Desktop Systems
- Mobile Device Security
- Password and Authentication Standard NEW
- Remote Access Security Requirements
- Standards for System Logging
- UA System Security Guidelines
- Vulnerability and Patch Management Standard NEW
PRIVACY POLICIES