These policies are related to using IT resources on the CWRU campus.
All other university policies are located with the University Compliance Program.
- I-1 Acceptable Use of Information Technology Policy (AUP)
- I-2 SSN Use Policy
- I-3 Information Technology Staffing Policy
- I-4 Information Technology Hardware Acquisition
- Legal Privacy Notice
Infrastructure & Procedures
Policies related to identity management and network usage.
- II-1a Identity Management for Temporary and Non-CWRU Employees
- II-2 Network ID and Account Expiration Policy
- II-2a Alumni Email Account Policy
- II-3 Network Protocols and Use Policy
- II-4 PCI-DSS Compliance
- II-4a PCI-DSS Technical Standards
- II-5 Copyright Notification Standard
- II-6 Network Defense Policy
- II-7 Gramm-Leach-Bliley Act Compliance
Information Security & Procedures
Policies related to categorizing and methods of protecting university data.
- III-1 Information Types and Sensitivity
- III-1a Risk Management Procedure and Risk Assessment Methods
- III-1b Risk Management Plan
- III-1c Controls- Protecting Public Information Systems
- III-1d Controls- Protecting Internal Use Information Systems
- III-1e Controls- Protecting Restricted Information
- III-1f PHI Standards to Augment Tier III Controls: Clinical Research Data
- III-1g Email Retention Policy
- III-1h eDiscovery Legal Hold Procedure
- III-1i Sanctioned Use of Google Apps for Education
- III-2 University Passphrase Policy
- III-3a Network Quarantine Procedure
- III-4 Surplus IT and Computer Equipment Reuse Policy
- III-5 Use of Encryption Certificates for CWRU Online Services
- III-5a Media Sanitization Procedure
- III-5b Mobile Device Configuration Standards
- III-7 University Logon Banner Standard