Login   |   Secure Purdue > Best Practices

IT Policies Hierarchy

The ITaP IT Security and Policy (ITSP) group facilitates the development of University information security policies and consults on information security compliance activities under federal, state, and local law.

This document details current University information security policy documents and the standards and guidelines related to each policy document. For more information about the information security policy process at Purdue, please visit: http://www.purdue.edu/securepurdue/bestPractices/draftITPolicies.cfm

Information Security Policy Document Definitions

Information Security Policy Documents Hierarchy

Delegation of Administrative Authority and Responsibility For Information Assurance, Security and Awareness (WL-4)

  • No related Standards at this time.
Authentication and Authorization Policy (VII.B.1) Privacy for Electronic Information (VII.B.2)
  • No related Standards at this time.
  • No related Guidelines at this time.
Incident Response (VII.B.3)
  • No related Standards at this time.
  • No related Guidelines at this time.
Remote Access to IT Resources (VII.B.4) IT Resource Logging (VII.B.5) Data Governance and Classification Policy (VII.B.6) Electronic Mail (VII.A.1)
  • No related Standards at this time.
  • No related Guidelines at this time.
IT Resource Acceptable Use Policy (VII.A.2) Social Security Number Policy (VII.B.7)
  • No related Standards at this time.
  • No related Guidelines at this time.
Data Security and Access Policy (C-34)
  • No related Standards at this time.
  • No related Guidelines at this time.
Policy for Purdue Pages on the World Wide Web (C-42)
  • No related Standards at this time.
  • No related Guidelines at this time.

Standards

Guidelines

Procedures

Purdue Calumet Security Policy Resources

Purdue North Central (PNC) Security Policy Resources

Indiana University-Purdue University Fort Wayne (IPFW) Security Policy Resources

 

Dated: February 7, 2012