IT Policy Statements: Quick Reference

  

IT Policy Statements: Quick Reference

NOTE:  This is an abbreviated list of commonly referred to Policy Statements.  This is NOT a comprehensive list.  For details on ALL IT Polices & Laws, see www.lsu.edu/itpolicy.

PS-06.15 Use of Electronic Mail (E-mail)

• Applies to anyone who has an *@lsu.edu address, which is the “official means of electronic communication by the University to faculty, staff, and students…”
• “Accounts and account passwords are not to be sold, rented, transferred, or shared with any other person. ”
• “Protected institutional and personal information shall not be sent via e-mail, unless specific steps are taken to ensure that the transmission or content of the e-mail is secure and encrypted in accordance with University standards, and the personal information therefore provided this additional level of protection.”
• Eligibility to obtain University e-mail accounts (@*.lsu.edu).
• Account retention.
• Mail backups, storage, and retention.  (Public records or other policies with different retention requirements may also apply.)
• Privacy and applicability of laws and policies.

PS-06.20 Security of Data

• “Responsibilities of all users in supporting and upholding the security of data at LSU”.
• “Protected information will not be disclosed except as provided by University policy and procedures, or as required by operation of law or court order. ”
• Chart for classification of data as public, private, or confidential.

PS-06.25 Privacy of Computing Resources

• Who may and may not access computing resources and data at LSU.
• Specifies strict conditions required in order to access computing resources and data outside of day-to-day access.

PS-06.05 (PS-107) Computer Users' Responsibilities

• “Guidelines and restrictions regarding any and all use of computing resources at, for, or through LSU”.
• “LSU may limit access to and/or review and monitor its computing resources and the use of computing resources, without notice to or authorization from user(s)”.
• Appropriate use, and misuse or abuse and sanctions.

PS-06.10 (PS-114) Security of Computing Resources

• “User(s) within functional unit(s) are required to report any suspected or known security breaches or flaws relating to the security of University computing resources to the IT Security & Policy Officer."

10744
7/21/2015 12:55:08 PM