Purdue IT Policies 

The ITaP IT Security and Policy (ITSP) group facilitates the development of University information security policies and consults on information security compliance activities under federal, state, and local law.

Policies are reviewed by ITSP and by the policy subcommittee of the Security Officers' Working Group. Draft policies are then presented to the University Security Officers' Working Group, the University Data Stewards organization, and other interested stakeholders.  After appropriate review by these groups, the formal University process is followed for policy signature.

Information Security Policy Document Definitions

Information Security Policy Documents Hierarchy

Information Security and Privacy (VII.B.8)

Authentication and Authorization Policy (VII.B.1) Incident Response (VII.B.3)
  • No related Standards at this time.
  • No related Guidelines at this time.
Remote Access to IT Resources (VII.B.4) IT Resource Logging (VII.B.5)

Acceptable Use of IT Resources and Information Assets (VII.A.4)

Social Security Number Policy (VII.B.7)
  • No related Standards at this time.
  • No related Guidelines at this time.
Policy for Purdue Pages on the World Wide Web (C-42)
  • No related Standards at this time.
  • No related Guidelines at this time.

Standards

Guidelines

Procedures

Purdue University Northwest Security Policy Resources

Indiana University-Purdue University Fort Wayne (IPFW) Security Policy Resources

 

Dated: February 7, 2012

Purdue University, 610 Purdue Mall, West Lafayette, IN 47907, (765) 494-4600

© 2015 Purdue University | An equal access/equal opportunity university | Copyright Complaints | Maintained by ITaP

Trouble with this page? Disability-related accessibility issue? Please contact ITaP at itap@purdue.edu.