UTech Services: Policies and Guides
Policies, Standards, Procedures, and Guidelines
Acceptable Use Policy (AUP) - The purpose of this policy is to address the use of University issued/owned Information Technology Resources.
Account Retention Policy - The purpose of this policy is to ensure consistent account retention practices in order to use limited resources efficiently and securely.
Data Classification Policy - This policy governs the privacy, security, and integrity of California University of Pennsylvania data, especially confidential data, and the responsibilities of institutional units and individuals for such data.
Electronic Mail Policy - This policy governs the usage of the electronic mail (e-mail) system.
Information Security Policy - This policy describes the requirements for securing computing and network connected devices and protecting confidential University data.
Password Policy - The purpose of this policy is to require a standard set of rules regarding the length, complexity and expiration time period for passwords and storage of passwords.
Security Incident Reporting and Response Policy - This policy serves to minimize the negative consequences of information security incidents and to improve the University’s ability to promptly restore operations affected by such incidents.
Extranet Policy (Draft) - This policy outlines the procedures that Third Party organizations must follow when connecting systems to the California University of Pennsylvania Network.
Banner Data Management Standard - The purpose of this document is to list rules and procedures for setting up and managing security within the Banner System at California University of Pennsylvania. It also outlines the responsibilities of all who access and manage the Banner-based data.
Logon Banner Standard - Logon banners provide a definitive warning that network intrusion is illegal and also warn authorized users of their obligations relating to acceptable use of the network.
Guidelines on Breach Notification - The purpose of these guidelines is to establish a PASSHE approach to lost or stolen Information Technology (IT) devices or PASSHE data and the steps to take for notification.
Remote Access Guidelines - These guidelines address the acceptable safeguards for use of privately owned and/or remote devices to access the California University of Pennsylvania network.
InCommon Federation: Participant Operational Practices - Participation in the InCommon Federation enables a federation participating organization to use Shibboleth identity attribute sharing technologies to manage access to on-line resources that can be made available to the InCommon community
InCommon Member Request Procedure - This procedure defines the steps needed for InCommon Members to request access to California University of Pennsylvania Services.
How-To Usage Guides
Get Adobe Reader
Adobe Reader is required to view and print PDF files. Click on the image below for free download.