Guidance Documents

BT0026 (Attachment) Second Program Financing Agreement
Disclosure Form for Outside Interests
FI0420 – FAQs
FI0717 – Acceptable and Unacceptable Gifts
FI0900 – Fringe Benefits and Internal Awards Provided to Employees Guidance Document
FIO311 – Merchant Approval Process Flow Chart

This is the Merchant Approval Process Flow Chart, meant to aid in Policy FIO311.

Full Guidance Document >

GE0002 Disclosures for Research Activities
GE0002 Do I Need to Disclose?
GE0002 What to Disclose
Guidance Document: GE003 | State and Federal Government Relations Activities

This Guidance Document is intended to promote transparency and further compliance with University Policy GE003 State and Federal Government Relations Activities by providing helpful guidance, instruction and/or non-exhaustive lists or illustrative examples to help guide the reader. This Guidance Document has no force or effect on any University Policy or Related Procedure and readers should contact appropriate subject matter experts, including their supervisor, for further guidance. This Guidance Document was created pursuant to University Policy GE0001.

Full Guidance Document >

HR0580 – Code of Conduct Guidance Document
IT0121-M-A – Mandatory and Discretionary Controls
IT0121-M-B – System Interconnections
IT0121-M-C – Critical Applications and Systems
IT0128-M-A – Contact Information
IT0128-M-C – Datacenter Orderly Shutdown Procedures
IT0128-M-D – Datacenter Cold Start Procedures
IT0128-M-E – Disaster Recovery Site Procedures
IT0128-M-F – Network DR Overview
IT0132-M-A – Banner Administrative Access Request Overview
IT0134-M-E – System and Communication Protection Program Exceptions
New Policy and Policy Revision Flowchart

This flowchart is intended to help individuals understand the how to initiate and/or revise University policy.

Full Guidance Document >

Policy Flowchart

This flow chart is intended to help illustrated personal versus University contact as it relates to policy.

Full Guidance Document >

Policy Template

This template is intended to assist policy writers in formatting and organizing the content of all university policies. Policy writers must use this template and follow The University of Tennessee System Policy and Procedure Glossary and Style Book.
University policies: (1) apply to all campuses and institutes and provide University employees guidance to ensure compliance with state and federal laws and regulations; (2) maintain adequate internal controls to safeguard the University’s assets; (3) provide consistent management of resources transactions across the University system; and (4) set the University’s expectations for conducting University business and communicates these expectations.

Full Guidance Document >

Procurement Card Guidance Document
Questions and Answers About UT Safety Policy SA0875 – Firearms

This questions-and-answers document is intended to provide guidance to employees to help employees comply with the state of Tennessee’s relevant firearms laws and UT policy. Employees who choose to carry a firearm do so at their own risk and are fully responsible for any consequences that arise from carrying a firearm. In the event of a conflict between state law and UT policy or this question-and-answer document, state law prevails.

Full Guidance Document >

SA0500-M Laser Registration Form
SA0900-M Appendix A
Security Assessment Worksheet
Security Impact Analysis Worksheet
Statement of Need and Impact

The Statement of Need and Impact form is what individuals seeking to institute a policy.

Full Guidance Document >

System-Wide Work from Home Guidelines
TI0128-M-B – External Business Partners
UTIA IT0115P – Organizational Guidance for the Classification of Information and Systems

This provides guidance for categorizing specific information types (for example: Confidential Information) at the University of Tennessee Institute of Agriculture (Institute).

Full Guidance Document >

UTIA IT0115P – Organizational Guidance for the Classification of Information and Systems
UTIA IT0122P – Information Security Incident Response Plan and Reporting Procedures

This document describes the appropriate procedures for reporting a security incident as detailed in UTIA IT0122 – Information Security Incident Response Policy.

Full Guidance Document >

UTIA IT0125P – Information Technology Change Control Procedures

Change control activities are focused on establishing and maintaining the integrity of products and systems, through control of the processes for initializing, changing, and monitoring the configurations of those products and systems. This is important in establishing and maintaining secure information system configurations, baseline configurations, and supporting the management of security risks for the Institute’s IT assets, including, but not limited to, desktops, laptops, servers, and networking equipment.

Full Guidance Document >

UTIA IT0127P – Audit and Accountability Procedures
UTIA Procedures for Implementing the UT System Policy for Conflict of Interest Guidance Document