The University of Chicago IT Policies
-
- Acceptable Use Policy – describes the policy governing the use of information technology at the University
- FAQs on the Acceptable Use Policy – provides answers to frequently asked questions about the AUP.
- Statement on Commercial and Political Use of IT Resources – describes details of prohibition of commercial and political use of resources
- File Sharing Policy – describes the file sharing policy for sharing copyrighted materials on the University network
- New Information Technologies and Intellectual Property at the University – describes the basic principles surrounding new information technologies and intellectual property at the University
- Use of External Service Providers – policy for using third party technology providers for data storage and transmission
- Policy for the Digital Use of the Social Security Number – provides usage and remediation guidelines for the use of Social Security Numbers in digital form
- Policy for Use of the ChicagoID – provides background information and usage guidelines for the ChicagoID
- Data Classification Guideline –defines classification of confidential information and assigns corresponding roles and responsibilities
- Policy for Authenticating University of Chicago Users – describes the requirements for Authenticating University of Chicago Users
- Policy On Computer Account and Email Requirements for University Employees – describes the policy for employee access to online University administrative systems
- End User Device Policy – defines specific steps end users take to appropriately secure from misuse or theft the computers and other electronic devices they regularly use for their own access to the network
- Placement of Computing Devices in Network Security Zones – describes the criteria used to determine how devices are placed into network security zones
- Use of Non uchicago.edu Domain Names – outlines the circumstances under which any domain name other than uchicago.edu can be used on the University network
- Redirection of University Domain Names to External Networks – describes the approval process for pointing a domain name to an external network
- Sanitization of Digital Storage Media – describes the mandatory processes for sanitizing various storage devices.
- FAQs on the Sanitization of Digital Storage Media – provides answers to frequently asked questions about sanitization of digital storage media
- Policy on Port Monitoring – describes the request methods and limitations on port monitoring
- Requirements for Managed (Hardware) Firewalls – governs all firewalls and devices that provide network address translation installed on the University’s network
- Research Data Center Policy – outlines how research data center resources are to be managed, to ensure optimal and equitable allocation of resources, as well as to require regular refreshment of old hardware to increase power usage efficiency.
- Research Data Protection Policy – sets forth roles and responsibilities to promote good research practices and mitigate the risks associated with improper treatment of research data.
- Digital Accessibility Policy – specifies how university web properties and their content should be updated to improve user experience
- Web Properties Management Policy – describes four practices to ensure web properties are managed in a secure and professional manner.
- Acceptable Use Policy – describes the policy governing the use of information technology at the University
Related Links
Data Stewardship Council
IT Services Procedures
IT Services Terms of Use
BSD & UCM Cyber Security Policies