UC, UCLA, and Anderson IT Security Policies
UC Systemwide Information Security
IS-3: Electronic Information Security
Institutional Information and IT Resource Classification Standard
Important Security Controls for Everyone and All Devices
Account and Authentication Management
Classification of Information and IT resources
Disposal of Institutional Information
Encryption Key and Certificate Management
Event Logging
Incident Response
Secure Software Configuration
Secure Software Development
BFB-IS-12: Continuity Planning and Disaster Recovery
BFB-IS-11: Identity and Access Management
Electronic Communications Policy (ECP)
UCLA IT Policies
UCLA Policy 420: Breaches of Computerized Personal Information
UCLA Policy 404: Encryption of Electronically Stored Personal Information
UCLA Policy 313: Prevention of Identity Theft
UCLA Policy 133: Security Camera Systems (Interim Policy)
UCLA Policy 401: Minimum Security Standards for Network Devices
UCLA Policy 410: Nonconsensual Access to Electronic Communications Records
UCLA Policy 314: Payment Card Processing Standards
UCLA policy 403: UCLA Logon ID Security Standards
UCLA Policy 455: UCLA Email Policy and Guidelines
UCLA Policy 410: Nonconsensual Access to Electronic Communications Records
UCLA Policy 411: Registration and Use of UCLA Domain Names
UCLA Policy 464: Online Copyright Infringement Liability Limitation
IT Services/Bruin OnLine Acceptable Use Policy
UCLA Procedure 220.1: Student Grievances Regarding Violation of FERPA or University Policies on Privacy Rights Applying to Disclosure or Content of Student Records
UCLA Policy 220: Disclosure of Information From Student Records
UCLA Policy 603: Privacy of and Access to Information (Legal Requirements)
IT Services/Bruin OnLine Accptable Use Policy
UCLA Procedure 220.1: Student Grievances Regarding Violation of FERPA or University Policies on Privacy Rights Applying to Disclosure or Content of Student Records
UCLA Policy 220: Disclosure of Information From Student Records
UCLA Policy 603: Privacy of and Access to Information (Legal Requirements)
UCLA Anderson Security Policies
Acceptable Use Policy
Access Control Policy
Account and Authentication Management Standard
Anti-Malware Procedures
Asset Management Procedures
Backup and Recovery Procedures
Business Continuity Plan
Capacity Management Procedures
Change Management Procedures
Clear Desk and Clear Screen Policy
Cryptography Key Management Policy
Cryptography Policy
Disposal of Institutional Information Standard
Encryption Key and Certificate Management Procedure
Identity and Access Management Policy
Information Classification and Management Procedure
Information Security Incident Management Procedure
Information Security Strategy
Logging Concept
Management of (Removable) Media and Storage Device
Minimum Security Standard
Mobile Device Policy
Password Policy
Remote Access Teleworking Policy
Secure Software Configuration Standard
Secure Software Development Standard
Supplier Management Security Policy
User Access Management Procedures
Vulnerability Management Procedures
Working in Secure Areas Procedures