Stephen F. Austin State University

Policy

IT Security Policies

Computer and Network Security (14.2)

This policy establishes the conditions and security requirements for the use of computing equipment and networks at SFA. Computing equipment includes desktops, laptops, servers, handheld devices, and printers.

Computer System Access (14.3)

This policy applies to university information resources that store or process mission critical and/or confidential information. The intended audience for this policy includes, but is not limited to, all information resources owners and system administrators.

Gramm Leach Bliley Act Required Information Security (14.4)

This policy defines the program as required by the GLBA to ensure ongoing compliance with federal regulations related to the program. This policy incorporates other university policies and procedures that deal with obligations to maintain the security of confidential information and those that are required by other federal and state laws and regulations.

Information Security for Portable Devices (14.6)

Portable computing devices are becoming increasingly powerful and affordable. However, the portability offered by these devices may increase the security exposure to the university and the individuals using the devices. The intended audience for this policy are all users who use SFA information resources, regardless of the portable device ownership.

Payment Card Acceptance and Security (14.8)

The purpose of this policy is to apply best security practices to ensure the protection of payment card information by complying with Payment Card Industry (PCI) Data Security Standards (DSS). This policy is supplemental to any other information security policies currently in effect at Stephen F. Austin State University.

Wireless Networking (14.11)

SFA's wireless local area network (LAN) enables wireless computing and provides reliable and secure network services in many locations on campus. It is a complementary system to the campus wired network.

Use of Electronic Information Resources (16.32)

SFA supports the responsible use of its electronic information resources. Information resources include, but are not limited to, computers, servers, wired and wireless networks, computer-attached devices, network-attached devices, voice systems, cable systems and computer applications.