The resources listed on this page are a refinement of University IT policy. This information is published for the purpose of helping system administrators in complying with University policy. As administrative applications and data become more distributed, the need for security expectations and responsibilities must be clear.
Nothing in these resources changes or supercedes any IT policy. If these resources conflict with University IT policies, then the respective policy document is the authoritative source for security statements. System-wide University IT policies can now be found at: http://www.purdue.edu/policies/information-technology.html