IT Security Policy Development and Lifecycle
Information technology policies are principles, rules, and guidelines formulated or adopted by an organization to reach its long-term goals. They are a part of organizational governance that may be needed enterprise-wide or at a department-level to help ensure compliance with laws, regulations, and statutory requirements.
This service can help create, update, or review IT security-related policies. It will ensure that the policy’s purpose, scope, and objectives are being met. This service is available to all university faculty and staff.
Service Charges or Fees
There are currently no service charges or fees for this service.
What You Can Request
Create IT Policy
Update IT Policy
Review IT Policy
Data Use Agreements (DUA)
Multi-factor Authentication (MFA)
Privileged Account Management (PAM)
Threat Monitoring, Detection, and Response (TMDR)
Vulnerability and Systems Posture Assessment (VASPA)
IT Compliance Assessment
IT Security Awareness and Training
IT Security Consulting
IT Risk Assessment
Security Policy and Compliance