SHARE
Facebook X Pinterest WhatsApp

Colorado State University Information Technology Security Policy

Colorado State University Information Technology Security Policy These IT security policies will aid in the protection of information of a sensitive nature. Colorado State University collects information of a sensitive nature to facilitate and enable its business/academic functions. Unauthorized access to such information may have many severe negative consequences, including adversely affecting the reputation of […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Jul 1, 2010

Colorado State University Information Technology Security Policy

These IT security policies will aid in the protection of information of a sensitive nature.


Colorado State University
collects information of a sensitive nature to facilitate and enable its
business/academic functions. Unauthorized access to such information may have many
severe negative consequences, including adversely affecting the reputation of the
University. Protection of such personally identifiable information from unauthorized
access is required by various private sector, federal and state mandates, including
among others the Health Insurance Portability and Accountability Act (HIPAA), the
Gramm-Leach-Bliley Act (GLBA), the Family Educational Rights and Privacy Act (FERPA),
Colorado House Bills 03-1175 and 06-1157, and the Payment Card Industry Data Security
Standard. Sensitive information is stored on a variety of computer systems in the
decentralized information technology (IT) environment at the University. As such
systems are being subjected to increasing numbers and types of attempted unauthorized
access, the adoption of these IT security policies will aid in the protection of such
information.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Colorado State University Information Technology Security Policy.pdf

Recommended for you...

Top Managed Service Providers (MSPs) 2022
Observability: Why It’s a Red Hot Tech Term
Tom Taulli
Jul 19, 2022
Top GRC Platforms & Tools in 2022
Jira vs. ServiceNow: Features, Pricing, and Comparison
Surajdeep Singh
Jun 17, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.