Information Technology Policies
Information Technology Policies
One of the most important attributes of Information Technology (IT) policies is that they be readily available. That's why we publish the most current policies that impact our users' ability to take advantage of UD's information technologies. These policies:
- provide general guidance on how to identify acceptable tools, what users should and shouldn't do on UD's network and things we all need to keep UD's computing community and the data of its customers safe and secure
- provide direction on specific legislative or industry requirements
- have the potential for helping folks understand the what and the how and, most importantly, the why
- do not necessarily prevent folks from doing undesired things
- makes people a part of the best-practices solution
University of Dayton Information Technology Policies
- Biometric Information Policy
- Change Management for PCI Environments Policy
- Confidentiality Agreement Requirement for Access to UD's Central Systems Policy
- Disposal and Redisposition of IT Equipment and Removable Media Policy
- Electronic Use of Confidential Data Policy
- Fair, Responsible and Acceptable Use of Electronic Resources Policy
- FTC Red Flags Rule Policy
- IT Incident Handling Policy
- IT Remote Access Policy
- PCI General Policy
- PCI Systems Standards Policy
- Server Audits Policy
- URL Assignments Policy
- Web Accessibility Policy
- Web Privacy Policy