ITS Policies & Guidelines
Purchasing and Equipment Loan
Personally Identifiable Information (PII) Protection
- Data Breach Response Policy
- Data Classification Policy
- Protected-Sensitive Data Disposal
- Encryption Policy
- Electronic Security Protected-Sensitive Data Policy
- Physical Security of Loyola Protected-Sensitive Data Policy
- Protected-Sensitive Data Identification Policy
- Personal Information Protection Compliance Review Policy
- Secure Deletion Procedure
Protected Health Information
Security
- Anti-Virus Policy
- Computer Security Standard
- Incident Response Plan
- Incident Reponse Plan - Appendix
- Log Management Standard
- Network Firewall Policy
- Network Firewall Standard
- Password Standard
- Router and Switch Standard
- Security Policy
- Security Awareness Policy
- Security Policy for Technology Professionals
- Server Security Standard
- Supported Operating Systems
- Vendor Access to Internal Systems
- Vendor VPN Access Procedure
- Vulnerability Assessment Policy
- Wireless Access Point and Router Policy
Ransomware Remediation Resources
Enterprise Content Management
Enterprise content refers to technologies used to manage content ranging from document management, imaging and workflow to web content and digital asset management. If you have questions, please contact the Help Desk at 8-4ITS.
Document Imaging Guidelines
Please contact the ITS Help Desk at 8-4ITS, if you have questions about document management systems, equipment or service.
Last Modified: Wed, December 18, 2024 2:28 PM CST
Personally Identifiable Information (PII) Protection
- Data Breach Response Policy
- Data Classification Policy
- Protected-Sensitive Data Disposal
- Encryption Policy
- Electronic Security Protected-Sensitive Data Policy
- Physical Security of Loyola Protected-Sensitive Data Policy
- Protected-Sensitive Data Identification Policy
- Personal Information Protection Compliance Review Policy
- Secure Deletion Procedure
Security
- Anti-Virus Policy
- Computer Security Standard
- Incident Response Plan
- Incident Reponse Plan - Appendix
- Log Management Standard
- Network Firewall Policy
- Network Firewall Standard
- Password Standard
- Router and Switch Standard
- Security Policy
- Security Awareness Policy
- Security Policy for Technology Professionals
- Server Security Standard
- Supported Operating Systems
- Vendor Access to Internal Systems
- Vendor VPN Access Procedure
- Vulnerability Assessment Policy
- Wireless Access Point and Router Policy
Enterprise Content Management
Enterprise content refers to technologies used to manage content ranging from document management, imaging and workflow to web content and digital asset management. If you have questions, please contact the Help Desk at 8-4ITS.