Ehelp

Three ways to connect:

1. Self Service


email_icon
support.cgu.edu


2. Instant Messaging


message_icon
Chat


3. Phone


call_icon
909-621-8174


OIT alerts

 

General Policies

Information Security Policies

 

Appropriate Use of Campus Computing and Network Resources Policy An overall guiding mission of The Claremont Colleges is education in an environment where the free exchange of ideas is encouraged and protected. The Claremont …
Appropriate Use of Computing Policy Policy: | Appropriate Use —|— Policy Owner: | The Council of The Claremont Colleges Table of Contents 1. Purpose 2. Scope 3. Policy 4. Roles …
CGU Anti-Virus Strategy, Policy & Guidelines This document outlines strategies, policies, and end-user responsibilities for maintaining security software (Anti-Virus, Spyware & Malware). OIT is responsible for ensuring a safe and secure …
CGU Technology Purchasing Standards and Procedures Purpose The purpose of this policy is to outline the process by which Claremont Graduate University acquires, replaces, and disposes of technology equipment. Further detail …
Cloud Software Application Questionnaire This questionnaire should be forwarded to the software provider. Answers should be forwarded to CGU Office of Information Technology. These questions are intended to help …
Continual Vigilance Policy Policy: | Continuous Vigilance —|— Policy Owner: | Information Security Program Committee Crosswalk NIST Cyber Security Framework (CSF) | DE.CM NIST SP 800-53 Securi
Data Backup Policy 1. Objective 1. The purpose of this Backup Policy is to provide for the backup and recovery of critical data and systems. The OIT Department …
Incident Response Policy Policy: | Incident Response —|— Policy Owner: | Information Security Program Committee Crosswalk NIST Cyber Security Framework (CSF) | RS.RP, RS.CO, RS.AN, RS.MI, RS.IM
Information Security Risk Assessment Policy: | Risk Assessment —|— Policy Owner: | Information Security Program Committee Crosswalk NIST Cyber Security Framework (CSF) | ID.RA NIST SP 800-53 Security Co
Information Technology Asset Management Policy Policy: | Asset Management —|— Policy Owner: | Manoj Chitre: AVP Technology Services/CIO Crosswalk NIST Cyber Security Framework (CSF) | ID.AM NIST SP 800-53 Securit
Information Technology Governance Policy Policy: | Governance Environment —|— Policy Owner: | Information Security Program Committee Crosswalk NIST Cyber Security Framework (CSF) | ID.GV NIST SP 800-53 Secu
Institutional Environment Policy Policy: | Institutional Environment —|— Policy Owner: | Information Security Program Committee Crosswalk NIST Cyber Security Framework (CSF) | ID.BE NIST SP 800-53 S
Mobile Device Policy Policy: | Mobile Device —|— Policy Owner: | Information Security Program Committee Crosswalk NIST Cyber Security Framework (CSF) | ID.AM-4, PR.AC-3 NIST SP 800-53 Se
Recovery Policy Policy: | Recovery —|— Policy Owner: | Information Security Program Committee Crosswalk NIST Cyber Security Framework (CSF) | RC.RP, RC.IM, RC.CO NIST SP 800-53 Secu
Security Operations Policy Policy: | Security Operations —|— Policy Owner: | Information Security Program Committee Crosswalk NIST Cyber Security Framework (CSF) | PR.IP NIST SP 800-53 Securit
Technology-Related HEOA Compliance Statement The Higher Education Opportunity Act of 2008 (HEOA) sets forth many requirements for colleges and universities. This statement pertains to the triad of requirements designed …
Training and Awareness Policy Policy: | Training and Awareness —|— Policy Owner: | Information Security Program Committee Crosswalk NIST Cyber Security Framework (CSF) | PR.AT NIST SP 800-53 Secu