IT0001 – General Statement on Information Technology Policy
This policy establishes the University’s general cybersecurity framework, roles and responsibilities for university constituents as they relate to information technology policies and procedures, the University’s rights, and definitions for terms used throughout System-wide information technology policies.
Full Policy >IT0002 – Acceptable Use of Information Technology Resources
This policy establishes the guidelines and expectations for the acceptable use of the University’s Information Technology Assets, Systems, Resources, and Data.
Full Policy >IT0003 – Information Technology Security Program Strategy
This policy provides guidance and structure for the University to implement a sound information technology security program for the University.
Full Policy >IT0004 – Information Technology Risk Management
This policy provides guidance and structure for the University to establish a risk-based Information Technology Security Program Strategy for the University.
Full Policy >IT0005 – Data Categorization
This policy provides guidance and structure for the University to properly categorize the University’s Data to ensure that the appropriate controls are in place to provide the most effective protections.
Full Policy >IT0006 – Accessibility
The University of Tennessee (UT) strives to deploy information, materials, and technology that have been designed, developed, or procured to be accessible to individuals with disabilities, including those who use assistive technologies.
Full Policy >IT0014 – Information Technology Security Awareness Training Management
This policy provides guidance and structure to the University to establish an information technology security awareness program strategy that enhances the ability to recognize threats and react accordingly.
Full Policy >IT0017 – Information Technology Incident Response Management
This policy provides guidance and structure for the University to develop and maintain a thorough written incident response plan that includes a written process for Users to report incidents and guidance for security issues that cross multiple campus and institute boundaries.
Full Policy >IT0102 – Information Technology Asset Management
This policy provides guidance and structure for the University to create and maintain sound processes for procuring, identifying, tracking, maintaining, and disposing of all University Information Technology Assets.
Full Policy >IT0311 – Information Technology Data Access, Management, and Recovery
This policy provides guidance and structure for the University to complete sound Data inventory, categorization, protection, handling, and disposal practices, including backup and recovery of University Data, as well as business continuity guidance.
Full Policy >IT0506 – Information Technology Account and Credential Management
This policy provides guidance and structure for the University to establish User Account lifecycle management and inventory processes of University accounts used for access to University Information Technology Resources. This will include guidelines for credential creation and issuance, account and credential usage, modifying access, and account termination.
Full Policy >IT1318 – Information Technology Network Monitoring and Defense and Penetration Testing
This policy provides guidance and structure for the University to establish appropriate control mechanisms for securing the University Information Technology Networks and to create a Penetration Testing process.
Full Policy >IT1516 – Information Technology Service Provider Management and Application Software Security Management
This policy provides guidance and structure for the University to establish an IT Service Provider program that manages inventory, classifies each IT Service Provider, ensures that IT Service Provider contracts include security requirements, and securely decommissions IT Service Providers. This policy also provides guidance and structure for University to establish and maintain a secure application development process including a process to accept and address reports of software vulnerabilities.
Full Policy >IT4912 – Information Technology Secure Configuration Management
This policy provides guidance and structure for the University to establish configuration guidelines for University Assets, as well as cloud platforms deployed for University use.
Full Policy >IT7810 – Information Technology Vulnerability Management, Audit Log Management, and Malware Defense Policy
This policy provides guidance and structure for the University to establish sound processes for performing Vulnerability Management, for performing threat and vulnerability monitoring, for creation and maintenance of audit logs, and for installation of anti-malware software on all University Assets.
Full Policy >