IT Policies and Procedures
Below are the various policies related to IT Security, Networking, Purchasing, Personally Owned Devices and computing in general. The last review dates are in parentheses.
IT Security Policies
- AGOT Usage Guidelines
- AGOT Sponsor Guidelines
- Computing Password Policy (07/24/2008)
- Digital Copyright Information
- Gramm-Leach Bliley Act (GLBA)
- HEA and Copyright Information
- HIPAA Information
- Information Security Policy
- IT Procedure for Handling 3rd Party Information Requests
- Network and Computer Usage Policy (07/01/2011)
- Non-TCU-Owned Server Policy
- PeopleSoft Security
- Remote Access Policy
- Sensitive Personal Information (SPI) Policy (10/27/2014)
- TCU Approved Electronic Storage Locations (05/2015)
- TCU BYOD Policy (09/2014)
- TCU Credit Card Policy
- TCU Data Classification Policy (05/2015)
- TCU InCommon Participant Operating Practices
- TCU Networked Printer Policy and Guidelines
IT Networking Policies
IT Purchasing Policies
Personally Owned Device Policies
- Network and Computer Usage Policy (07/01/2011)
- Sensitive Personal Information (SPI) Policy (10/27/2014)
- TCU BYOD Policy (09/2014)
Related TCU Policies
Laws and Regulations
- Digital Millennium Copyright Act (DMCA)
- Family Educational Rights and Privacy Act (FERPA)
- Gramm-Leach-Bliley Act (GLBA)
- Health Insurance Portability and Accountability Act (HIPAA)
- USA Patriot Act – Handling Requests for Library Information and Records