Information Technology 8.01 Compliance with IT Policies & Continuous Improvement Compliance with IT Policies & Continuous Improvement 8.01.01 Compliance with IT Policies & Continuous Improvement Compliance with IT Policies & Continuous Improvement 8.01.02 Technology Services Technology Services 8.02 Computer Resources, Internet & Network Acceptable Use Computer Resources, Internet & Network Acceptable Use 8.02.01 Computer Resources, Internet & Network Acceptable Use Computer Resources, Internet & Network Acceptable Use 8.03 Electronic Records Retention Electronic Records Retention 8.03.01 Electronic Records Retention Electronic Records Retention 8.04 Electronic Signatures Electronic Signatures 8.04.01 Electronic Signatures Electronic Signatures 8.05 Computer Hardware Upgrade Computer Hardware Upgrade 8.05.01 Computer Hardware Upgrade Electronic Signatures 8.06 Video Surveillance System & Records Video Surveillance System & Records 8.06.01 Video Surveillance System & Records Video Surveillance System & Records 8.07 Peer-to-Peer File Sharing Policy Peer-to-Peer File Sharing 8.07.01 Peer-to-Peer File Sharing Policy Procedure Peer-to-Peer File Sharing Policy 8.08 College IT Accounts College IT Accounts 8.08.01 College IT Accounts College IT Accounts 8.08.02 College IT Account Username Changes College IT Accounts Username Changes 8.09 Security Awareness Training Security Awareness Training 8.09.01 Security Awareness Training Security Awareness Training 8.10 Information Security Program Information Security Program 8.10.01 Information Security Program Information Security Program 8.11 Information Classification & Handling Information Classification & Handling 8.11.01 Information Classification & Handling Information Classification & Handling 8.12 Human Resource Security Human Resource Security 8.12.01 Human Resource Security Human Resource Security 8.13 Risk Management Risk Management 8.13.01 Risk Management Risk Management 8.14 End User Information Security End User Information Security 8.14.01 End User Information Security End User Information Security 8.15 Information Security Incident Response Information Security Incident Response 8.15.01 Information Security Incident Response Information Security Incident Response 8.16 Access Control Access Control 8.16.01 Access Control Access Control 8.17 Information Systems Operations Security Information Systems Operations Security 8.17.01 Information Systems Operation Security Information Systems Operations Security 8.18 Enterprise Asset Management Enterprise Asset Management 8.18.01 Enterprise Asset Management Enterprise Asset Management 8.19 Software Asset Management Software Asset Management 8.19.01 Software Asset Management Software Asset Management 8.20 Data Management Data Management 8.20.01 Data Management Data Management 8.21 Secure Configurations Management Secure Configurations Management 8.21.01 Secure Configurations Management Secure Configurations Management 8.22 Vulnerability Management Vulnerability Management 8.22.01 Vulnerability Management Vulnerability Management 8.23 Audit Log Management Audit Log Management 8.23.01 Audit Log Management Audit Log Management 8.24 Malware Defense Malware Defense 8.24.01 Malware Defense Malware Defense 8.25 Data Recovery Data Recovery 8.25.01 Data Recovery Data Recovery 8.26 Service Provider Management Service Provider Management 8.26.01 Service Provider Management Service Provider Management 8.27 Pornography Prohibited on College Networks & Devices Pornography Prohibited on College Networks & Devices 8.27.01 Pornography Prohibited on College Networks & Devices Pornography Prohibited on College Networks & Devices