IT Policies and Procedures
Below are the various policies related to IT Security, Networking, Purchasing, Personally Owned Devices and computing in general. The last review dates are in parentheses.
IT Security Policies
- Information Security Policy
- Logging and Monitoring Policy
- Network and Computer Usage Policy (07/01/2011)
- Sensitive Personal Information (SPI) Policy (10/27/2014)
- TCU BYOD Policy (09/2014)
- TCU Credit Card Policy
- TCU Data Classification Policy (05/2015)
- TCU Networked Printer Policy and Guidelines
IT Security Procedures and Guidelines
- AGOT Usage Guidelines
- AGOT Sponsor Guidelines
- Digital Copyright Information
- Gramm-Leach Bliley Act (GLBA)
- HEOA and Copyright Information
- HIPAA Information
- IT Procedure for Handling 3rd Party Information Requests
- Non-TCU-Owned Server Policy
- Password Requirements (07/24/2008)
- PeopleSoft Security
- TCU Approved Electronic Storage Locations
- TCU InCommon Participant Operating Practices
- Written Information Security Program
IT Networking Policies
IT Purchasing Policies
Personally Owned Device Policies
- Network and Computer Usage Policy (07/01/2011)
- Sensitive Personal Information (SPI) Policy (10/27/2014)
- TCU BYOD Policy (09/2014)
Related TCU Policies
Laws and Regulations
- Digital Millennium Copyright Act (DMCA)
- Family Educational Rights and Privacy Act (FERPA)
- Gramm-Leach-Bliley Act (GLBA)
- Health Insurance Portability and Accountability Act (HIPAA)
- USA Patriot Act – Handling Requests for Library Information and Records