Production Maintenance Complete for Saturday, May 8, 2021
All enterprise and business applications are in service at this time.
Portal Status: Green
Computers, networks, software applications and other information technology (IT) products are powerful tools that facilitate the University of Colorado’s (CU’s) core mission in teaching, learning, research, and service. Access to these tools is a privilege available to university faculty, staff, students, and authorized guests. With this privilege comes a responsibility to follow principles of acceptable use.
The purpose of the CU System Administration Information Technology Policy is to ensure IT products and tools are used for purposes consistent with and supportive of the university’s core mission.
This policy applies to use of:
The acceptable use of IT resources requires individuals to follow basic security practices. Users of System Administration IT resources must:
CU policies and procedures permit authorized staff to take certain actions to manage and protect IT resources. Authorized System Administration staff (including but not limited to IT Security) may, without notice:
The university considers, at a minimum, the following uses to be unacceptable. IT resources should not be used to:
If a CU System Administration employee unacceptably uses IT, the following sanctions may apply:
As noted in this policy, employees should review other policies related to their work. It is recommended that all employees who use computers as part of their daily work review the following policies:
Employees who have a primary job duty related to IT should also review these policies:
Employees who work with student records should also review these policies:
Office of Information Security - email@example.com
Brad Judy – Director of Information Security, University Information Services, University of Colorado
Dan Jones – Chief Information Security Officer, University of Colorado
Version 1.0 – 10-16-2012 (not published)
Version 1.1 – incorporated feedback from Vice Presidents