SCSU Home search sitemap
oit banner
<Home> <Faculty> <Help Desk> Policy Departments Reports
 
P O L I C Y , G U I D E L I N E S , & P R O C E D U R E S

This section of the OIT website contains documents of multiple types. Some are established SCSU, CSU and State policies, replicated here; others are established OIT policies, procedures and guidelines. Many of the documents are here only in provisional draft form, without formal approval or implementation.
  • SCSU Information Security GLBA Compliance Statement (draft, v. 8; 5/27/03)

    The following document pertains to Southern Connecticut State University's compliance with the requirements of the Gramm-Leach-Bliley Act as mandated by the federal government. This document will provide information as to the requirements set forth, SCSU's compliance assessment and progress with these requirements, and the responsibilities employees and departments must follow to remain in compliance with GLBA related concerns. The "SCSU Information Security GLBA Compliance Statement" is a guideline for appropriate practices and security measures to ensure that SCSU will comply with GLB now and into the future. Please contact OIT with questions.
  • GLBA Information

    Protecting secure data on our computer systems is a task of the utmost importance for which all of us must take responsibility.
  • SCSU Information Security Usage Policies and Procedures (draft, 10/13/05)

    This Security Policy is provided to all members of university community to provide proper guidelines on each individual's responsibility to protect SCSU information through the appropriate usage and application of security measures to individual computers, university accounts (Windows, Banner, MySCSU, etc) and other technology services available on campus. Every individual should understand their obligations relating to the policy statements described herein.

    SCSU staff responsible for planning, acquisition, configuration, deployment, management, and auditing of information systems should apply sound risk management practices when selecting security controls. This would include identifying what information is intended to be protected, what are the threats to that information or information system resource and the proper cost-effective safeguards that need to be applied to adequately protect the information.   This resource acts as a guide for such practices. Questions should be addressed to the appropriate IT personnel should they arise.
 

 

Copyright © 2005. Office of Information Technology. SCSU. All right reserved.