GLOBAL Alert Overide

Vight condensed lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergr sea takimata sanctus est Lorem ipsum dolor sit amet. Lorem ipsum dolor sit amet, consedipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua.

Skip to main content

Information Technology Policy Updates and Changes

Chuck Frazier, Vice Provost for Information Technology

This note is to announce some updates and changes to UF IT policies. These updates were reviewed and approved in the Information Technology Advisory Council (ITAC) and the ITAC committee structure. See the revised policies at the URLs below and note too that a new policy was created to address spam.

Acceptable Use of Computing Resources
http://www.it.ufl.edu/policies/aupolicy.html

IT Security Policy
http://www.it.ufl.edu/policies/security/index.html

IT Security Procedures
http://www.it.ufl.edu/policies/security/procedures.html

Guidelines to Develop Applications for Secure Deployment
http://www.it.ufl.edu/policies/security/guidelines-app-dev.html

Spam Policy:
http://www.it.ufl.edu/policies/spam.html

In the area of security, it is important to remember that all major UF units must designate a Unit Information Security Manager (ISM). Please make sure that any changes in designated Unit ISMs are made known to the UF ISM, Kathy Bergsma (kbergsma@ufl.edu, 392-2061).

Security is very challenging for any organization dependent on information resources. Universities, of course, are particularly dependent on IT and some would say we are also particularly if not naturally vulnerable to security incidents. So, having and supporting a Unit ISM responsible for maintaining specific internal unit IT documentation, security policy and procedures, and a business resumption plan is very important.

We will review polices on a regular basis and revise as circumstances dictate. Campus communication and collaboration is very good on security. With your continued interest, help and support, I am sure we will be able to develop and follow good security practices and to do so in ways that are consistent with our academic values and goals.