Knowing and following policy
Review the university’s Information Security and Assurance Policy, which describes physical security information as well as computer and mobile device security.
Know and follow these policies governing the specific type of information you are using, and the way to use it.
- The Student Records Policy, which describes the different types of student information protected by FERPA, and whether and how you can share it.
- The Acceptable Use Policy, which sets out the requirements for using university computer networks and resources.
- The Electronic Communications Policy, which sets out the requirements for using email, voicemail, electronic instant messaging, and internet access.
- The Employee cell Phones for Business use Policy, which requires that employees who access university data using cell phones or Smartphones must secure such devices with a password.