Policies, Standards, & Procedures
The Library & Information Technology Services division strives to use its resources to best support the community’s needs. From time to time, we must also develop policies to serve as guidelines to help protect the College’s resources from abuse, illegal activity, etc. This page provides an index of some of our current policies. Please direct any questions, comments, or concerns regarding these policies to the Information Security Team at [email protected].
- Policy on Information Security
- Policy on Acceptable Use
- Policy on Legal Hold (Restricted Access)
- Policy on Privacy (Coming Soon)
- Policy on Copyright Infringement (Coming Soon)
- Policy on Credit Card Acceptance (Coming Soon)
- Payment Card Procedure (Coming Soon)
- Payment Card Processing Application
- Policy on Technology Resources Procurement (Coming Soon)
- Technology Resources Procurement Procedure (Coming Soon)
- Technology Vendor Risk Assessment Intake Form
- Trinity Technology Vendor Contract Agreement (Restricted Access)
- Standard on Information Security Risk Management
- Information Security Risk Management Guidance (Restricted Access)
- Standard on Data Classification
- Data Classification Resource Matrix (Coming Soon)
- Standard on Information Security Vulnerability Management (Restricted Access)