91¶ÌÊÓƵ

skip to content

Documents

91¶ÌÊÓƵ provides some basic documentation to help you stay in compliance with many aspects related to Information Security. This is not a comprehensive list but this will provide you with the most common information. 

The . The Utah Legislature grants it the power to control, manage, and supervise USHE. 91¶ÌÊÓƵ also uses the USHE Policies to form univerisity policies. 

For example:  USHE has a policy on business communication - - that requires an organizational email account to be used for all university related business. This ensures that we are able to comply with government laws and public access requests. The other major USHE policiy that is used is the  

Policies

A policy is typically a document that outlines specific requirements or rules that must be met. In the information/network security realm, policies are usually point-specific, covering a single area.

University policies are intended to be in accordance with federal and state laws and regulations regarding safe computing.

Policies

Standards

The following security standards will help define some common topics and practices.

Standards

Peer-to-Peer (P2P) Compliance

The Higher Education Opportunity Act (HEOA) contains provisions for the regulation of P2P applications when used in ways that infringe on the copyrights of commercial works.

Several sections of the HEOA deal with the unauthorized file sharing on campus networks, imposing three general requirements on all U.S. colleges and universities.

HEOA P2P Compliance

Software Agreements

End User License Agreements (EULA) cover how software is supposed to be handled. These agreements are legally binding so it is necessary that you read and understand the content in a software agreement. Software agreements are legally binding. It is important that you read the EULA before you install any software as they may put your privacy and computer at risk.

Software Agreements