IT Policies
Review Process
IT Project Governance is used for KU IT Policy approval, and for the regular review cycle for official KU IT Policies. We are currently using a temporary process for our IT policy reviews, while concurrently developing an overall IT Policy Administration framework, based on best practices from peer institutions. More detailed information on this new framework will be posted once approved. Efforts are underway to group Policies together in review, as many Policies reference, or are associated with other Policies. We are also considering criteria for what needs to be an official Policy, or what could be an official Guideline or Standard.
The current process follows a similar process as IT Projects. Existing IT Policies will be selected for review based on their last date of review or approval. These Policies are then reviewed and updated by IT staff, the Policy owner, IT Security, and campus constituents. While still in draft, the Policy is distributed to the Service Councils for public comment and review. Feedback is discussed and incorporated into the Policy, and then submitted to the KU Policy Office for official review and approval. For more information on the official development and approval process, please see the KU Policy Office website.
University Information Technology Policies
Policies, procedures, guides, standards and related documentation pertaining to information technology at the university are available in the KU Policy Library. Key IT-related policies are listed below.
Use and Access Policies
- Acceptable Use of Electronic Information Resources Select to follow link
- Information Technology Security Policy Select to follow link
- Password Policy Select to follow link
- Learning Management Systems Policy Select to follow link
- Information Access Control Policy Select to follow link
- Investigative Contact by Law Enforcement, Policy and Procedures Select to follow link
Data Handling & Security Policies
- Data Classification and Handling Policy Select to follow link
- Gramm-Leach-Billey Student Financial Information Security Policy Select to follow link
- Electronic Data Disposal Policy Select to follow link
- E-Commerce Policy Select to follow link
- Roles and Responsibilities for Information Management Policy Select to follow link
- Security Procedure: Risk and Vulnerability Assessments Select to follow link
Network & Infrastructure Policies
- Virtual Private Network (VPN) Service on the University of Kansas Data Network Select to follow link
- Data Center and Server Room Policy Select to follow link
- Network Policy Select to follow link
- Server Registration and Centralization Select to follow link
- Wireless Local Area Network (LAN) Systems Policy Select to follow link
- Systems Development Life Cycle (SDLC) Policy Select to follow link
- Telecommunications Physical Infrastructure Select to follow link
- Telecommunications Wiring Policy Select to follow link