An earlier draft of this policy is currently in effect as an interim policy. Prior to this interim policy, the content of this policy was scattered across multiple policies. The primary changes from previous versions are procedural.
The full text of the policy is available here.
Please provide your comments on the revisions.
The policies below will posted at least through the end of the work day on April 24, 2024.
A suite of cybersecurity policies were ennacted as interim policies in order to maintain compliance with federal regulation. As is our normal process, the interim policies have been thoroughly reviewed and revised and are now available for public comment. Any documents that are not linked below are available upon request (email rbruce@jcu.edu), with permission from the CIO. You will only be able to view the linked policies from your JCU Google account.
- Cybersecurity Program
- Sensitive Data and Cybersecurity Policy
- Acceptable Use Policy
- Incident Response Policy
- Change Management Policy
- Patch and Vulnerability Management Policy
- Email Policy
- Identity and Access Management Policy
Please provide your comments on the policies.