Policies – ASK JASON

Policies, Standards, and Guidelines for Best Practice

Code of Computer Ethics and Acceptable Use

The Code of Computer Ethics and Acceptable Use outlines the ethical and acceptable use of information systems at Iowa State University. This policy is in place to ensure that members of the university community have access to reliable IT resources that are safe from unauthorized or malicious use. You also can view the CCEAU Summary [PDF].

Data Warehouse (e-Data) Policy

The Data Warehouse (e-Data) policy establishes uniform data management standards and identifies the shared responsibilities for assuring that the e-Data warehouse provides security, protects privacy and has integrity while it efficiently and effectively serves the needs of Iowa State University.

Desktop Computer Standards

The Desktop Computer Standards apply to the purchase and support of desktop hardware and software, including connection to the campus network infrastructure. These standards contribute to a responsive, dependable, and supportable computing environment at Iowa State.

IT Services Diversity Statement

The IT Services Diversity Statement establishes the general principles that guide the department in the areas of diversity and fairness.

Domain Name System (DNS) Policy

The Domain Name System policy defines the format for university domain names, provides a review mechanism to avoid naming conflicts, safeguards the reputation of the university, avoids competition with commercial entities, and protects the privacy and security of confidential information.

InCommon Participant Operational Practices

The InCommon Participant Operational Practices outlines Iowa State University’s identity management as required for a participant in the InCommon Federation.

IT Security Policy

The IT Security Policy establishes the general principles of IT security applied throughout the university related to the risks and responsibilities of each member of the university.

IT Security Incident Reporting Policy

The IT Security Incident Reporting Policy outlines the procedures individuals should follow to report potentially serious IT security incidents (viruses, worms, hacking, etc.) including securing systems, monitoring and reporting IT security incidents, and assisting individuals, administrators, and IT staff to resolve security problems. To report an incident, use the IT Security Incident Report form or the ISU Confidential Hotline.

Risk Assessment

Approved tools and documents for conducting risk assessments at Iowa State University.

Software License Compliance

Software License Compliance outlines how Iowa State University students, faculty, and staff are responsible for using computer software legally and may be required to demonstrate that the software on their computers is appropriately licensed.

Telecommunications

Campus standards for voice, data, and video communications.

Wireless Policy

The Wireless Policy provides policies, standards, and guidelines for best practice as they relate to providing and using Iowa State University’s wireless network. Specifically, the policy identifies user and service provider responsibilities, lists the industry wireless standards supported on campus, addresses frequency issues, stresses the importance of security, and provides guidelines and best practices to improve security.

Mass Email and Effective Electronic Communication

The Mass Email Policy provides policies, standards, and guidelines for best practice as they relate to the distribution of email across campus as efficiently as possible and to have email be beneficial rather than disruptive to people in their work.

Backup Retention Policy

The Backup Retention Policy establishes a limit on the length of time backups are maintained by the Central IT Partners and encourages units to distinguish between the purposes and practices of backing-up data versus the retrieval or archiving of data.