This page lists all IU information technology related policies.
This specifies procedures for reporting misuse or abuse of IU information technology resources, and sanctions that may be applied for misuse or abuse of IU information technology resources.
The policy defines misuse or abuse as “uses of Indiana University information technology resources that violate existing laws or university policies and procedures (including but not limited to University Information Technology Policies; the Code of Student Rights, Responsibilities, and Conduct; the Academic Handbook; University Human Resources Policies; and University Financial Policies), or that otherwise violate generally accepted ethical norms and principles. Misuse or abuse also includes the sharing or transferring of an individual's university accounts, including network ID, password, or other access codes that allow them to gain access to university information technology resources, with one or more other persons.”
This is the main policy concerning privacy of information, files, and communications on IU information technology resources. It spells out what the policy covers and designates as private anything not specifically identified as information that can be accessed by appropriately authorized personnel in the performance of the role related responsibilities. The policy specifies what access by technicians and administrators does not require authorization and conditions under which other information may be accessed and procedures for requesting authorization.
This is the main IU policy that governs what needs to be done to ensure security of university owned devices. The Procedures, Functional unit technicians points 7, 12, and 13 lay out the requirements that unit technicians need to satisfy to keep computers patched and up-to-date.
This policy specifies who has access to institutional data and the responsibilities of those who have access to institutional data. The policy defines ‘institutional data’ and provides a classification of institutional data in to critical, restricted, university-internal, and pubic data.