Policies & Standards
Policies vs. Standards vs. Procedures
PoliciesÌýare formal statements created by the university that reflect our mission, which in this case is the protection of ¼ªÏ鷻’s information and assets.
StandardsÌýare rules or actions that must be done to ensure our policies are being followed. They indicate expected behavior and must be enforced.
ProceduresÌýare detailed step by step instructions on how to implement or adhere to the standards.
GuidelinesÌýare recommended practices that are based on industry-standard practices.
Forms | Form Description |
---|---|
Use this form to request local administrative rights on your work desktop. | |
USB Storage Device Exception | Visit this page to learn about dangers of using USB storage devices and how to request an exception. |
Use this form for Consultants and Independent Contractors needing access to ¼ªÏé·» systems and data. | |
Use this form for employee access to University data systems containing personal, academic, or financial information about students, faculty, staff, or alumni. | |
Faculty should use this form for employee access to University data systems containing personal, academic, or financial information about students, faculty, staff, or alumni. | |
Visit this page to learn more about ¼ªÏé·» Financial Systems and how to request access. | |
SOLAR Student Administration Security Access | Visit this page to learn more about Student administration and how to request access. |
Use this form to request access HR resources such as approving time and absence. |
Access Control
Additional Resources:
- CSU Data ClassificationÌý(Level 1 vs. Level 2 vs. Level 3 data)
- ¼ªÏé·» Information Security Plan
- BlocklistsÌý
- Security checklistÌý
Cloud Policy
Old Policy No.Ìý | New PolicyÌý | Standards | Procedures, Guidelines, Executive Orders (EO),ÌýSupplemental Policies,(SP) |
---|---|---|---|
7100 | Ìý | Ìý | |
8000 |
Introduction and Scope |
Ìý |
Ìý |
8005 | Ìý | Ìý | |
8010 |
Establishing an Information Security ProgramÌý |
Ìý
Ìý |
Ìý |
8015 | Ìý | ||
8020 | Ìý | ||
8025 | Ìý | Ìý | |
8030 | Ìý | ||
8035 | Ìý | ||
8040 |
Managing Third Parties |
Ìý Ìý Ìý | |
8045 |
Information Technology Security |
Ìý Ìý |
Ìý Ìý ÌýÌý Ìý Ìý |
8050 |
Ìý Ìý Ìý |
ÌýÌý |
|
8055 | Ìý Ìý Ìý | ||
8060 | |||
8065 |
Ìý |
||
8070 | |||
8075 | |||
8080 | Ìý | ||
8085 | Ìý | ||
8090 | Ìý |
ÌýÌý Ìý Ìý Ìý ÌýÌý |
|
8095 | Ìý | Ìý | |
8100 | Ìý | ||
8105 | Ìý | Ìý |