IT Policies

IT Policies

Acceptable Use Policy - Specify how computers and systems are to be used for business purposes in serving the interests of the university and of the university's constituents in the course of normal operations.

Cloud Storage and Distribution of Sensitive Information Policy - Guidelines for storing and sharing sensitive information

Computer and Network Usage Policy - General scope of using the University network and connected computers

Data Backup and Recovery Policy - Outlining contingency plans and compliance for data recovery processes

Faculty and Staff Computer Replacement Policy - Details the guidelines regarding the purchase, replacement, reallocation, and disposal of desktops and laptops

Internet Privacy Policy  - Policy specifying the utlization of user data for the UD website

Password Policy - Guidelines for selecting and securing passwords

P2P Software Policy - Peer to Peer File Sharing Policy

Personal Computer Support Policy - Policy for software and hardware support for personal computers

Online Gaming Policy - Firewall and port usage for online gaming

Single Sign On (SSO) Policy - Outlining usage of SSO credentials

Social Engineering Education Policy - Compliance and preventative measures to prevent social engineering attacks

Virtual Private Network (VPN) Policy - Policy defining the acceptable use and responsibility when using UD's VPN client