A suite of cybersecurity policies were ennacted as interim policies in order to maintain compliance with federal regulation. As is our normal process, the interim policies have been thoroughly reviewed and revised and are now available for public comment. Any documents that are not linked below are available upon request (email rbruce@jcu.edu), with permission from the CIO. You will only be able to view the linked policies from your JCU Google account.
- Cybersecurity Program
- Sensitive Data and Cybersecurity Policy
- Acceptable Use Policy
- Incident Response Policy
- Change Management Policy
- Patch and Vulnerability Management Policy
- Email Policy
- Identity and Access Management Policy
Please provide your comments on the policies.
The policy below will posted at least through the end of the work day on May 22, 2024.
The only revision to this existing policy to the Committee has added an additional relationship type to the prohibited (unless managed) list:
- a faculty or staff member and a traditional-aged undergraduate student, generally considered to be a person who is aged 18-23
The full text of the revised policy is available here.
Please provide your comments on the revisions.