Index
- University Policies Relating to Information Technology
- University Policies Relating to Information Security
- ITS Business Practices
University Policies Relating to Information Technology
The use of CSU Channel Islands information technology resources is subject to the University Policy on Responsible Use and other applicable administrative policies as well as local, State and Federal laws. Please visit the Administrative Policy Manual online for details on University policy, and to the California State University Responsible Use Policy (ICSUAM 8105.0).
University Policies Relating to Information Security
Channel Islands is committed to protecting the confidentiality, integrity, and availability of information assets owned, leased, or entrusted to the University. Therefore, CSU Channel Islands hereby adopts both the California State University Information Security Policies and Standards and the Channel Islands Supplemental Security Policies and ITS Business Practices. Please visit the CSU System Policy and Standards grid for details regarding the CSU Information Security policies and standards and below for the CSU Channel Islands ITS Business Practices.
Information Technology Services Business Practices
ITS is striving to document and standardize its operations through Business Practices. ITS publishes these documents here for quick reference and consumption by the University community.
Unless otherwise specified, Business Practice documents apply to all employees of ITS.
ITS Administration
- BP.00.001 - Business Practices
- BP.00.002 - ITS Change Control
- BP.00.004 - Administrator in Charge
- BP.00.005 - Project Intake
- BP.00.008 - Project Close
- BP.00.010 - Management Review of DASS
- BP.00.011 - IT Project and Procurement Governance
- BP.00.012 - Qualtrics Use and Survey Activation
Information Management
- BP.01.003 - Organization and Management of Information Security at Channel Islands
- BP.01.008 - Security Incident Response
- BP.01.012 - Source Code Management
Technology Infrastructure
Technology Usage
- BP.03.001 - HEOA Compliance
- BP.03.002 - Administrative Access to Workstations
- BP.03.003 - Physical Access to ITS Facilities
- BP.03.004 - Telecommuting Computer Use
- VPN Access Form (Adobe Sign)
- BP.03.009 - Personal Computer Inventory
- BP.03.011 - Public Cloud Storage and Enterprise File Sync and Share
- BP.03.012 - Hardware End-of-Life and "Red Tagging"
- BP.03.013 - Secure Disposal of Computing Equipment
- BP.03.014 - Computer Moves
- BP.03.015 - EOL/Obsolete Computers (PDF)
- BP.03.016 - Acceptable Use Policy of IT Resources (PDF)
Information Security, Policy and Compliance
- BP.05.001 - Information Asset Management - Data Ownership
- BP.05.002 - Use of Monitoring Technologies
- BP.05.003 - Access Controls - Multi-Factor Authentication
- BP.05.004 - Access Controls - Access Review
- BP.05.005 - Asset Monitoring - Log Management
- BP.05.006 - Information Technology Security - Mobile Device Access
- BP.05.010 - Information Technology Governance
Service Level Agreements (SLAs)
Please visit the ITS SLAs page.
File Viewing Information
This web page may contain Microsoft Word (.doc/x) and/or Adobe Acrobat PDF (.pdf) files.
To view Microsoft Word documents, please download and install Microsoft Office.
To view Adobe Acrobat PDF documents, please download and install the free Adobe Acrobat Reader.