
- #Sample information security policy document how to#
- #Sample information security policy document pdf#
Record Retention and Disposition Schedulesĭesignated Information Authorities of CP Recordsĭata and Cloud Storage & Sharing (OneDrive)Įlectronic Mail and Messaging: Reporting Policy Violations Record Retention and Disposition Standard
#Sample information security policy document how to#
How to use the "Initialize All Data/Settings Option" on Canon Devices (PDF)Ĭompliance with HEOA Peer-to-Peer File Sharing RequirementsĭMCA Procedures: Cal Poly Response to Copyright Infringement Claimsĭisposition of Protected Data and University Devices White Paper: Canon imageRUNNER Security (PDFĪFD Response to imageRUNNER Security White Paper (PDF)ĪFD ANTS Technical Documents: Canon Copier Configuration (DOC) University Advancement Security and Confidentiality Agreement

Use and Release of Student Information (FERPA)

#Sample information security policy document pdf#
Please report suspected violations to and direct comments, questions and other inquiries to documents linked to on this page are PDF format unless otherwise noted.

These policies are not intended to prevent, prohibit or inhibit the sanctioned use of campus information assets as required to meet Cal Poly's core mission and academic and administrative goals. To help safeguard and secure campus information and information resources, all users and campus departments are expected to adhere to these policies and standards where applicable or to request an exception. The ISP and RUP are supplemented by additional policies, standards, guidelines, procedures, and forms designed to ensure campus compliance with applicable policies, laws and regulations. Information security is governed primarily by Cal Poly's Information Security Program (ISP) and Responsible Use Policy (RUP).
