Acceptable Use of Technology

Scope and Purpose The Technology Acceptable Use Policy serves as a comprehensive guide for users on the appropriate utilization of technology assets owned by St. Mary’s University. It is important to emphasize that while this policy provides clear guidelines and...

Account Provisioning and Retention

Introduction In our commitment to ensuring the security, accessibility, and integrity of our University’s information systems, the Account Provisioning and Retention policy has been established to provide clear guidelines for the creation, management, and...

Data Center Access

Introduction The Information Services Data Centers house St. Mary’s University’s mission-critical computing and networking resources. These facilities provide a stable, secure environment with enhanced security measures, uninterruptible power supply,...

Data Server Backup

Introduction The Data Server Backup Policy establishes a comprehensive framework for backing up, recovering, and retaining data and systems within the University. The main objectives of this policy are to protect critical University data, minimize the risk of data...

Information Resources Acquisition

The offices of the Vice President of Information Services (VPIS) are charged with assessing, procuring, implementing and maintaining information resources in support of the St. Mary’s University mission. The Information Resources Acquisition policy establishes...

Information Security Plan

Summary The Information Security Plan was created to allow Information Services the ability to create a foundation of information security for the St. Mary’s University community. Purpose The purpose of the Information Security Plan (ISP) is to establish a framework...

Information Services Systems Change Management

Purpose Change management refers to a formal process for making changes to IS (Information Services) services or systems. The goal of change management is to increase awareness and understanding of proposed changes across an organization and ensure that all changes...

Passwords

Summary Passwords serve as a fundamental defense mechanism for safeguarding University information systems and other valuable resources against unauthorized use. Constructing secure passwords and diligent password management is imperative for maintaining the integrity...

Third Party Vendor Access

Summary Third party entities play an important role in the support of hardware and software management, and operations for the University. When properly authorized they can remotely view, copy, and modify data and audit logs; they correct software and operating system...

VPN Access

Summary Secure remote access to the University’s network is essential for maintaining the integrity and confidentiality of our data. A Virtual Private Network (VPN) provides a secure encrypted network connection over the Internet between authorized St. Mary’s...
Back to top