Difference between revisions of "Portal:IT Unit"

From AMACWiki
Jump to: navigation, search
(Policies)
(Policies)
Line 18: Line 18:
 
==Policies==
 
==Policies==
  
{| border="1" cellspacing="1" cellpadding="1"
+
* [http://www.amac.uga.edu/security/Acceptable_Use_Policy.htm Acceptable Use Policy] - Describes acceptable use of computer equipment, data, and information systems.
!Name
+
* [http://www.amac.uga.edu/security/Application_Service_Providers.htm Application Service Provider (ASP) Policy] - Describes proper selection and requirements of Application Service Providers engaged by AMAC.  
!Summary
+
* [http://www.amac.uga.edu/security/Email_Policy.htm Email Use Policy] - Describes proper use of electronic mail system and services.  
|-
+
* [http://www.amac.uga.edu/security/AntiVirus_Guidelines.htm Guidelines on Anti-Virus Process] - Describes actions to prevent infection of computers and networks by computer viruses and other malicious code.  
|[https://www.uga.edu/amac/security/Acceptable_Use_Policy.htm Acceptable Use Policy]
+
* [http://www.amac.uga.edu/security/Backup_Guidelines.htm Guidelines on Personal Computer Backup Process] - Describes actions to prevent personal computer data loss due to hardware failures and other causes.  
|Describes acceptable use of computer equipment, data, and information systems.
+
* [http://www.amac.uga.edu/security/Physical_Security_Guidelines.htm Guidelines on Physical & Environmental Security] - Describes actions to prevent security breeches due to building and office access.  
|-
+
* [http://www.amac.uga.edu/security/Third_Party_Guidelines.htm Guidelines on Third Party Access] - Describes actions to ensure appropriate use of AMAC information systems and computing services by third parties.  
|[https://www.uga.edu/amac/security/Application_Service_Providers.htm Application Service Provider (ASP) Policy]
+
* [http://www.amac.uga.edu/security/Information_Sensitivity_Policy.htm Information Sensitivity Policy] - Describes how employees determine what information can be disclosed to non-employees, as well as the relative  sensitivity of information that should not be disclosed outside of AMAC without proper authorization.  
|Describes proper selection and requirements of Application Service Providers engaged by AMAC.  
+
* [http://www.amac.uga.edu/security/Password_Policy.htm Password Policy] - Describes the standard for creation of strong passwords, the protection of those passwords, and the frequency of change.  
|-
+
* [http://www.amac.uga.edu/security/Router_Security_Policy.htm Router Security Policy] - Describes the required minimal security configuration for all routers and switches connecting to a production network or used in a production capacity at AMAC.  
|[https://www.uga.edu/amac/security/Email_Policy.htm Email Use Policy]
+
* [http://www.amac.uga.edu/security/Server_Security_Policy.htm Server Security Policy] - Describes the standards for the base configuration of internal server equipment that is owned and/or operated by AMAC.
|Describes proper use of electronic mail system and services.  
+
|-
+
|[https://www.uga.edu/amac/security/AntiVirus_Guidelines.htm Guidelines on Anti-Virus Process]
+
|Describes actions to prevent infection of computers and networks by computer viruses and other malicious code.  
+
|-
+
|[https://www.uga.edu/amac/security/Backup_Guidelines.htm Guidelines on Personal Computer Backup Process]
+
|Describes actions to prevent personal computer data loss due to hardware failures and other causes.  
+
|-
+
|[https://www.uga.edu/amac/security/Physical_Security_Guidelines.htm Guidelines on Physical & Environmental Security]
+
|Describes actions to prevent security breeches due to building and office access.  
+
|-
+
|[https://www.uga.edu/amac/security/Third_Party_Guidelines.htm Guidelines on Third Party Access]
+
|Describes actions to ensure appropriate use of AMAC information systems and computing services by third parties.  
+
|-
+
|[https://www.uga.edu/amac/security/Information_Sensitivity_Policy.htm Information Sensitivity Policy]
+
|Describes how employees determine what information can be disclosed to non-employees, as well as the relative  sensitivity of information that should not be disclosed outside of AMAC without proper authorization.  
+
|-
+
|[https://www.uga.edu/amac/security/Password_Policy.htm Password Policy]
+
|Describes the standard for creation of strong passwords, the protection of those passwords, and the frequency of change.  
+
|-
+
|[https://www.uga.edu/amac/security/Router_Security_Policy.htm Router Security Policy]
+
|Describes the required minimal security configuration for all routers and switches connecting to a production network or used in a production capacity at AMAC.  
+
|-
+
|[https://www.uga.edu/amac/security/Server_Security_Policy.htm Server Security Policy]
+
|Describes the standards for the base configuration of internal server equipment that is owned and/or operated by AMAC.  
+
|}
+
  
 
==Procedures==
 
==Procedures==

Revision as of 09:10, 15 July 2008

Welcome to the AMACWiki Information Technology Unit Portal.
The Information Technology (IT) Unit develops and maintains information systems that support AMAC processes and services.
 

Applications

Policies

Procedures

Tools