IT Policy and Standards
Section 1 – Introduction, Roles, and Ownership
Section 2 – Programming
Section 3 – Controls and Security
Section 4 – Documentation
Section 5 – Computer Software
Section 6 – User Accounts and Acceptable Use
Section 7 – Electronic Course Development and Implementation
Section 8 – Acquisition of Technology and Services
Section 9 – Data Recovery and Protection from Power Surges and Outages
Section 10 – Disaster Recovery Plan
Section 11 – Firewall
Section 12 – Messenger Email Services
Section 13 – Server Management
Section 14 – Desktop PC Management
Section 15 – Virus Protection
Section 16 – Operating System Updates
Section 17 – Use of Personal Computing and Mobile Devices – Bring Your Own Device (BYOD)
Section 18 – Banner Access and Security Policy
Section 19 – Data Center Access
Section 20 – Computer Systems Security Breach Policy