The following Documents contain policies and guidelines to identify, define, and outline how to securely handle, discard, and report the inappropriate use of University student data according to the requirements of the FERPA, GLBA, HIPAA Acts.
IT POLICY DOCUMENTS
Acceptable Use Policies
- Acceptable Use Policy
- Acceptable Use Policy: Email
- Acceptable Use Policy: Wireless Communications Devices
- Acceptable Use Policy: Virtual Private Network
Access Control Policies
Awareness & Training Policies
Data
Device & Account Security
- Bring Your Own Device (BYOD) Policy
- Inventory Management Policy
- Mobile Device Security Policy
- Password Policy
- Patch Management Policy
Incident Management
Risk Management
Miscellaneous Policies & Programs
- Clean Desk Policy
- JSU Market Place Privacy Policy
- JSU Market Place Refund Policy
- JSU Phishing Management Program
- JSU Vendor Management Program
- Systems-Network Share and Storage Policy