IT Policies
The Office of Information Technology issues policies and guidelines that help the FAU community protect their computers and the privacy of data. We encourage everyone to read through these documents to ensure they are in compliance with University policies. Please contact us if you have any questions and/or you need clarification on any of the University's policies.
You will need Adobe Acrobat Reader to read any of the PDF files below.
General University Technology Policies
FAU Policies and Procedures Manual Security Policies
-
University Administrative Data Systems
-
Acceptable Use of Technology Resources
-
Responsible Use of Data Access
-
Digital Millennium Copyright Act
-
Digital Millennium Copyright Act FAU Designated Agent Information
-
Privacy of Electronic Communications
-
Security Awareness Training
-
System and Data Classifications
FAU Additional Information Security Policies
-
Information Security Policies
-
Information Security Roles and Responsibilities
-
This policy document contains the following policies:
IS-POL-1 Protecting Electronic University Data
IS-POL-2 Patching and Vulnerability Management
IS-POL-3 Virtual Private Network (VPN) and Remote Access Policy
IS-POL-4 IT Asset Inventory
IS-POL-5 Mobile Device Management
IS-POL-6 Security Event Logging
IS-POL-7 Cloud Infrastructure
IS-POL-8 Change Management and Approval
IS-POL-9 Vulnerability Scanning
IS-POL-10 Cyber-Threat Intelligence Review
IS-POL-11 Risk Assessments
IS-POL-12 Incident Response
IS-POL-13 Network Segmentation
IS-POL-14 Capacity Planning
IS-POL-15 Security Fault-Tolerance
IS-POL-16 Reporting Security Incidents
IS-POL-17 Encryption Standards