听
IT Policies
The Office of Information Technology issues policies and guidelines that help the FAU community protect their computers and the privacy of data. We encourage everyone to read through these documents to ensure they are in compliance with University policies. Please contact us if you have any questions and/or you need clarification on any of the University's policies.
You will need Adobe Acrobat Reader to read any of the PDF files below.
General University Technology Policies
FAU Policies and Procedures Manual Security Policies
-
University Administrative Data Systems
-
Acceptable Use of Technology Resources
-
Responsible Use of Data Access
-
Digital Millennium Copyright Act
-
Digital Millennium Copyright Act FAU Designated Agent Information
-
Privacy of Electronic Communications
-
Security Awareness Training
-
System and Data Classifications
FAU Additional Information Security Policies
-
Information Security Policies
-
Information Security Roles and Responsibilities
-
This policy document contains the following policies:
听听听听听听听听 IS-POL-1 Protecting Electronic University Data
听听听听听听听听 IS-POL-2 Patching and Vulnerability Management
听听听听听听听听 IS-POL-3 Virtual Private Network (VPN) and Remote Access Policy
听听听听听听听听 IS-POL-4 IT Asset Inventory
听听听听听听听听 IS-POL-5 Mobile Device Management
听听听听听听听听 IS-POL-6 Security Event Logging
听听听听听听听听 IS-POL-7 Cloud Infrastructure
听听听听听听听听 IS-POL-8 Change Management and Approval
听听听听听听听听 IS-POL-9 Vulnerability Scanning
听听听听听听听听 IS-POL-10 Cyber-Threat Intelligence Review
听听听听听听听听 IS-POL-11 Risk Assessments
听听听听听听听听 IS-POL-12 Incident Response
听听听听听听听听 IS-POL-13 Network Segmentation
听听听听听听听听 IS-POL-14 Capacity Planning
听听听听听听听听 IS-POL-15 Security Fault-Tolerance
听听听听听听听听 IS-POL-16 Reporting Security Incidents
听听听听听听听听 IS-POL-17 Encryption Standards
听