ITS Policies & Guidelines
Access & Use
- Access Control Policy
- Acceptable Use Policy for University Computing Labs
- Digital Millennium Copyright Act
- Cloud Computing Policy
- Ownership and Use of Data
- Rights and Responsibilities When Using Electronic University Resources
- Standard for Student Worker Access to PeopleSoft Resources
- Access and Responsible Use of University Electronic Mail Systems
- Access and Responsible Use of University Electronic Mail Systems for Electronic Mass Communications
- Electronic Mail and Voice Mail Use and Disclosure Policy
ITS Internal Policies
- Change Management Policy
- Privileged Access Policy
- Vulnerability Risk Review Procedure
- Approved High Security Network Vendors
- F5 Configuration Standard
- PCI Linux Configuration Standard
- PCI Windows Configuration Standard
Personally Identifiable Information (PII) Protection
- Data Breach Response Policy
- Data Classification Policy
- Disposal of Loyola Protected and Loyola Sensitive Data Policy
- Encryption Policy
- Physical Security of Loyola Protected and Loyola Sensitive Data Policy
- Loyola Protected and Loyola Sensitive Data Identification Policy
- Personal Information Protection Compliance Review Protocol
- Secure Deletion Procedure
Purchasing and Equipment Loan
Security
- Antivirus Policy
- Computer Security Standard
- Incident Response Plan
- Incident Reponse Plan - Appendix
- Log Management Standard
- Network Firewall Policy
- Network Firewall Standard
- Password Standard
- Router and Switch Standard
- Security Policy
- Security Awareness Policy
- Security Policy for Technology Professionals
- Server Security Standard
- Supported Operating Systems
- Vendor Access to Internal Systems
- Vendor VPN Access Procedure
- Vulnerability Assessment Policy
- Wireless Access Point and Router Policy
Protected Health Information
Ransomware Remediation Resources
Enterprise Content Management
Enterprise content refers to technologies used to manage content ranging from document management, imaging and workflow to web content and digital asset management. If you have questions, please contact the Help Desk at 8-4ITS.
Document Imaging Guidelines
Please contact the ITS Help Desk at 8-4ITS, if you have questions about document management systems, equipment or service.
Related University Policies
Last Modified: Mon, June 17, 2024 9:34 AM CDT
Access & Use
- Access Control Policy
- Acceptable Use Policy for University Computing Labs
- Digital Millennium Copyright Act
- Cloud Computing Policy
- Ownership and Use of Data
- Rights and Responsibilities When Using Electronic University Resources
- Standard for Student Worker Access to PeopleSoft Resources
- Access and Responsible Use of University Electronic Mail Systems
- Access and Responsible Use of University Electronic Mail Systems for Electronic Mass Communications
- Electronic Mail and Voice Mail Use and Disclosure Policy
ITS Internal Policies
- Change Management Policy
- Privileged Access Policy
- Vulnerability Risk Review Procedure
- Approved High Security Network Vendors
- F5 Configuration Standard
- PCI Linux Configuration Standard
- PCI Windows Configuration Standard
Personally Identifiable Information (PII) Protection
- Data Breach Response Policy
- Data Classification Policy
- Disposal of Loyola Protected and Loyola Sensitive Data Policy
- Encryption Policy
- Physical Security of Loyola Protected and Loyola Sensitive Data Policy
- Loyola Protected and Loyola Sensitive Data Identification Policy
- Personal Information Protection Compliance Review Protocol
- Secure Deletion Procedure
Purchasing and Equipment Loan
Security
- Antivirus Policy
- Computer Security Standard
- Incident Response Plan
- Incident Reponse Plan - Appendix
- Log Management Standard
- Network Firewall Policy
- Network Firewall Standard
- Password Standard
- Router and Switch Standard
- Security Policy
- Security Awareness Policy
- Security Policy for Technology Professionals
- Server Security Standard
- Supported Operating Systems
- Vendor Access to Internal Systems
- Vendor VPN Access Procedure
- Vulnerability Assessment Policy
- Wireless Access Point and Router Policy
Protected Health Information
Ransomware Remediation Resources
Enterprise Content Management
Enterprise content refers to technologies used to manage content ranging from document management, imaging and workflow to web content and digital asset management. If you have questions, please contact the Help Desk at 8-4ITS.
Document Imaging Guidelines
Please contact the ITS Help Desk at 8-4ITS, if you have questions about document management systems, equipment or service.