Best Practices
Introduction
In order for the IT department to maintain a stable, reliable and secure computing environment, and to make the most efficient use of IT resources and staff, the IT department maintains this Best Practices site which governs the installation, configuration and use of IT Resources. Users are encouraged to familiarize themselves with the various sections of the site that may impact their use of IT resources.
Table of Contents
- Access Management
- Change Management
- Computer Lab Software Guidelines
- Data Classification
- Disaster Recovery
- Identity Management Processes
- Incident Management
- Log Management
- Media Handling
- Mobile/Remote Computing
- Network Security
- Passwords
- Physical Security
- Protecting Private Sensitive Information
- Server Configuration
- Supported Hardware (Computer Labs and Faculty/Staff Offices)
- Workstation Configuration
