Information Technology Policies
| IT001.3 Cybersecurity Awareness Training Policy - November 5, 2024 |
The purpose of this Policy is to: implement mandatory cybersecurity awareness training for all Employees and Contractors who have access to the university’s Information Technology Assets as required by ACT 155 of the 2020 Regular Session of the Louisiana Legislature, HB 633, codified at LA R.S. 42:1267. |
|
| IT002.1 Account Access Policy - May 2, 2022 |
This policy specifies how access to accounts with protected data stored on University IT Resources are issued, modified, and revoked for entities affiliated with the University. |
|
| IT003.1 IT System Change Control Policy - June 27, 2022 |
Policy that describes tracking of IT system changes affecting major University administrative systems. These references are primarily tracked within the Computing Center's web ticket system or via reports that can be obtained from contracted service providers. |
|
| IT004.2 Data Security Policy - April 5, 2023 |
The policy and procedures detailed in this document were developed to ensure that users who have been granted access to University Information Technology (IT) Resources understand their responsibilities related to system security and confidentiality of information. |
|
| IT005.1 Data Sanitization Policy - April 5, 2023 |
The purpose of this policy is to ensure that data are permanently destroyed when university-owned computer storage media are transferred or surplused. It is not intended to replace or supersede detail policy and procedure of property transfer or surplus, but to provide details related to removal of security-sensitive data. |
|
| IT006.1 Data Center Access Policy |
This policy will address the proper handling and review of physical personnel occupancy and access within OIT’s primary Data Center located in Walker 1-89. OIT will track and report every person(s) entering and exiting the Data Center |
|
| IT007.1 Computing Systems Security Breach Policy - June 6, 2023 |
The purpose of the Computing Systems Security Breach Policy is to detail the specific procedures that are to be utilized in the event of a Computing Systems Security Breach, including the required notice to affected individuals and other parties. Prompt detection and appropriate handling of these security incidents are necessary to protect information assets critical to the University’s mission, preserve personal data privacy and confidentiality, and facilitate compliance with applicable laws and regulations. |
|
| Security Video Data Policy - January 1, 2010 |
|