Information Technology

Articles (26)

Acceptable Use of Electronic Information Resources

This policy outlines the expectations for the use of electronic information resources at the University of Kansas.

Data Center and Server Room Policy

The purpose of the Data Center and Server Room Policy is to describe the minimum requirements for designing, installing, securing, monitoring, maintaining, protecting, and decommissioning a data center or server room at the University of Kansas.

Data Center and Server Room Standards

The purpose of the Data Center and Server Room Standards is to describe the minimum requirements for designing, installing, securing, monitoring, maintaining, protecting, and decommissioning a data center or server room at the University of Kansas.

Data Classification and Handling Policy

Information is a valuable University asset and is critical to the mission of teaching, research, and service to Kansans.Determining how to protect and handle information depends on a consideration of the information’s type, importance, and usage.Classification is necessary to understand which security practices should be used to protect different types of information. The more protected the information needs to be, the more practices are required.

Data Classification and Handling Procedures Guide

This Procedures Guide for the University community was created to help you effectively manage information in your daily mission-related activities. Determining how to protect & handle information depends on a consideration of the information’s type, importance, and usage. These procedures outline the minimum level of protection necessary when performing certain activities, based on the classification of the information being handled. Classification is necessary to understand which security p

Electronic Data Disposal Policy

Data confidentiality is an issue of legal and ethical concern. The purpose of this policy is to provide for proper cleaning or destruction of sensitive/confidential data and licensed software on all computer systems, electronic devices and electronic media being disposed, recycled or transferred either as surplus property or to another user.

Electronic Data Disposal Procedure

The purpose of this procedure is to implement the University of Kansas Electronic Data Disposal Policy.

Gramm-Leach-Bliley Student Financial Information Security Program

This document outlines the University of Kansas, Lawrence, program to protect critical information and data and to comply with Federal Law[1] on student financial information. The goal of this document is to define the University's Gramm Leach Bliley (GLB) Student Financial Information Security Program, to provide an outline to assure ongoing compliance with federal regulations related to the Program and to enhance the University’s ability to respond to likely future privacy and security regulat

Information Access Control Policy

To ensure the security and integrity of university data and information assets as well as safeguard the information of its constituents. All Kansas University technology resources will adhere to a uniform access control standard and framework.

Information Technology Security Policy

This Information Security Policy (“Policy”) defines the security requirements that everyone who works or studies at KU Lawrence campus and all reporting units is expected to be familiar with and consistently follow. These security measures are set forth to avoid problems that affect the Confidentiality, Integrity, and Availability of information and systems at the University.

Investigative Contact by Law Enforcement, Policy and Procedures

To assist University faculty and staff in responding to investigative contact by law enforcement officials.

IT Security Incident Response Policy

The Information Technology (IT) Security Incident Response Policy defines the responsibilities of KU Lawrence campus and all reporting units staff when responding to or reporting security incidents.

Learning Management Systems (LMS) Policy

To provide decision-making guidance for the use of learning management systems (LMS) licensed by the University of Kansas.

Network Policy

To define the University network and establish operational provisions governing use and operation of the network.

Password Policy

The purpose of this policy is to establish a standard for creation of strong passwords, the protection of those passwords, and the frequency of password change.

Roles and Responsibilities for Information Management Policy

The proper stewardship and custodianship of University administrative information will facilitate access to data that supports the work of those with official educational or administrative responsibilities within the institution, consistent with legal, ethical, competitive, and practical considerations.This document informs information stewards, managers, custodians, and users of data of their responsibilities.Note:  Nothing in this document precludes or addresses the release of institutional da

Security Procedure: Risk and Vulnerability Assessments

The procedure describes a framework for the assessment of potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic and paper data held by units of the University and outlines those items normally assessed in a University conducted Risk and Vulnerability Assessment.

Server Hosting Policy

To ensure the registration and collection of accurate information about all servers owned, operated or housed by the University of Kansas Lawrence campus and all reporting units and affiliated organizations, or servers that store data belonging to the University regardless of their location. This policy also describes the criteria for centralization of these systems into centrally administered data centers.

Systems Development Life Cycle (SDLC) Policy

The purpose of the Systems Development Life Cycle (SDLC) Policy is to describe the requirements for developing and/or implementing new software and systems at the University of Kansas and to ensure that all development work is compliant as it relates to any and all regulatory, statutory, federal, and /or state guidelines.

Systems Development Life Cycle (SDLC) Standard

The purpose of the Systems Development Life Cycle (SDLC) Standards is to describe the minimum required phases and considerations for developing and/or implementing new software and systems at the University of Kansas.

Telecommunications Physical Infrastructure

This policy covers the use of KU property to enable a telecommunications component on the Lawrence and Edwards campuses of the University of Kansas, regardless of location or placement on University buildings, towers or land, including that which is owned /operated by non-University entities but located on University property.

Telecommunications Wiring Policy

To establish principles and provisions to guide the University in the construction and ongoing management of its telecommunications cabling infrastructure.

Use of Electronic Signatures

This policy identifies the written standards governing the use of electronic signatures.

Virtual Private Network (VPN) Remote Access Procedure

To define administrative and operational procedures associated with VPN Remote Access Service. 

Virtual Private Network (VPN) Service on the University of Kansas Data Network

This policy outlines the purpose and approved use of Virtual Private Networks on the University of Kansas network

Wireless Local Area Network (LAN) Systems Policy

This policy outlines a uniform set of components, installation practices, processes, procedures and operational criteria, in order to manage (802.11x) wireless LAN systems and to ensure that these resources are used in a secure and efficient fashion.