General Policies
Information Security Policies
Appropriate Use of Campus Computing and Network Resources Policy | An overall guiding mission of The Claremont Colleges is education in an environment where the free exchange of ideas is encouraged and protected. The Claremont … |
Appropriate Use of Computing Policy | Policy: | Appropriate Use —|— Policy Owner: | The Council of The Claremont Colleges Table of Contents 1. Purpose 2. Scope 3. Policy 4. Roles … |
CGU Anti-Virus Strategy, Policy & Guidelines | This document outlines strategies, policies, and end-user responsibilities for maintaining security software (Anti-Virus, Spyware & Malware). OIT is responsible for ensuring a safe and secure … |
CGU Technology Purchasing Standards and Procedures | Purpose The purpose of this policy is to outline the process by which Claremont Graduate University acquires, replaces, and disposes of technology equipment. Further detail … |
Cloud Software Application Questionnaire | This questionnaire should be forwarded to the software provider. Answers should be forwarded to CGU Office of Information Technology. These questions are intended to help … |
Continual Vigilance Policy | Policy: | Continuous Vigilance —|— Policy Owner: | Information Security Program Committee Crosswalk NIST Cyber Security Framework (CSF) | DE.CM NIST SP 800-53 Securi |
Data Backup Policy | 1. Objective 1. The purpose of this Backup Policy is to provide for the backup and recovery of critical data and systems. The OIT Department … |
Incident Response Policy | Policy: | Incident Response —|— Policy Owner: | Information Security Program Committee Crosswalk NIST Cyber Security Framework (CSF) | RS.RP, RS.CO, RS.AN, RS.MI, RS.IM |
Information Security Risk Assessment | Policy: | Risk Assessment —|— Policy Owner: | Information Security Program Committee Crosswalk NIST Cyber Security Framework (CSF) | ID.RA NIST SP 800-53 Security Co |
Information Technology Asset Management Policy | Policy: | Asset Management —|— Policy Owner: | Manoj Chitre: AVP Technology Services/CIO Crosswalk NIST Cyber Security Framework (CSF) | ID.AM NIST SP 800-53 Securit |
Information Technology Governance Policy | Policy: | Governance Environment —|— Policy Owner: | Information Security Program Committee Crosswalk NIST Cyber Security Framework (CSF) | ID.GV NIST SP 800-53 Secu |
Institutional Environment Policy | Policy: | Institutional Environment —|— Policy Owner: | Information Security Program Committee Crosswalk NIST Cyber Security Framework (CSF) | ID.BE NIST SP 800-53 S |
Mobile Device Policy | Policy: | Mobile Device —|— Policy Owner: | Information Security Program Committee Crosswalk NIST Cyber Security Framework (CSF) | ID.AM-4, PR.AC-3 NIST SP 800-53 Se |
Recovery Policy | Policy: | Recovery —|— Policy Owner: | Information Security Program Committee Crosswalk NIST Cyber Security Framework (CSF) | RC.RP, RC.IM, RC.CO NIST SP 800-53 Secu |
Security Operations Policy | Policy: | Security Operations —|— Policy Owner: | Information Security Program Committee Crosswalk NIST Cyber Security Framework (CSF) | PR.IP NIST SP 800-53 Securit |
Technology-Related HEOA Compliance Statement | The Higher Education Opportunity Act of 2008 (HEOA) sets forth many requirements for colleges and universities. This statement pertains to the triad of requirements designed … |
Training and Awareness Policy | Policy: | Training and Awareness —|— Policy Owner: | Information Security Program Committee Crosswalk NIST Cyber Security Framework (CSF) | PR.AT NIST SP 800-53 Secu |