Policies, Procedures and Guidelines
Technology Policies, Procedures and Guidelines
CIS Procedures and Guidelines
- Backup and Data Recovery
- CIS Change Management Policy
- CIS NetTel Standards - Division 27 Requirements
- CIS Network and Telecommunications Charge-back
- CIS Privileged Account Usage
- CIS Service Disruption Notification Procedures
- Email / Document Retention and Recovery
- Email-Retraction Policy (Spam/Phishing)
- Employment Separation Procedures
- Lifecycle Replacement of Building Active Electronics (Infrastructure)
- Server Maintenance Policy
- Server Provisioning, Hosting and Remote Access Policy
Campus Technology Policies
- Authorization of Third-Party Email Senders via DKIM SPF DMARC
- Centralized PC Purchasing Policy
- Centralized Printing Policy
- Cloud Computing Policy
- Computer Acceptable Use Policy
- Computer User Accounts and Resources
- Email Signature Policy
- Employee Email List Use and Guidelines
- Enterprise Software Acquisition
- Guest Network Access
- Internet Content Filtering
- Password Policies and Guidelines
- Privileged System Access Policy
- Profile Photo Guidelines
- Use of Personal / Un-Managed Devices for Work
- Website Terms of Use
Technology Regulatory Compliance
- DMCA Copyright Compliance / Peer-to-Peer File Sharing
- Identity Theft Prevention Program - Red Flags Rule
- PCI DSS Credit Card Handling
- Preservation and Collection of Electronic Records (eDiscovery)
- Security Incident: Management and Reporting
- Technology Security Laws and Regulations