These standards and procedures are developed in accordance with the Workstation Management Policy. Authority of enforcement of these standards and procedures is delegated by the Chief Information Officer to the Chief Security Officer (CSO) and the ITS Director of Technical Services
The use of cyber security standards can greatly assist in the protection of process control systems ...
Access to University IT resources from off-campus locations has increased due to the proliferation o...
R926-1. Purpose: To require appropriate use of office owned IT resources for official work of the of...
Improperly configured computer systems can be compromised and have their data destroyed or stolen; u...
The purpose of this policy is to provide procedures on computer workstation management at Georgia So...
This standard defines the essential rules regarding the management and maintenance of firewalls at G...
Policy Summary: Procedures must be in place to ensure all University workstations are classified bas...
As established by the USG IT Handbook section 5.6, the level of security controls implemented on a s...
A methodology for the ensured security of a workstation connected in a computer network with in an o...
Guidelines for office computer workstations are present in many forms, from recognised international...
All authorized users have an interest in the security of the computer resources at Georgia Southern ...
Authentication is how we establish trust in monitoring systems and measurements to verify compliance...
Access to University IT resources from off-campus locations has increased due to the proliferation o...
University System of Georgia Board of Regents Policy Section 11.1 established that the Board of Rege...
These standards reflect Georgia Southern University’s implementation of The Board of Regents Busines...
The use of cyber security standards can greatly assist in the protection of process control systems ...
Access to University IT resources from off-campus locations has increased due to the proliferation o...
R926-1. Purpose: To require appropriate use of office owned IT resources for official work of the of...
Improperly configured computer systems can be compromised and have their data destroyed or stolen; u...
The purpose of this policy is to provide procedures on computer workstation management at Georgia So...
This standard defines the essential rules regarding the management and maintenance of firewalls at G...
Policy Summary: Procedures must be in place to ensure all University workstations are classified bas...
As established by the USG IT Handbook section 5.6, the level of security controls implemented on a s...
A methodology for the ensured security of a workstation connected in a computer network with in an o...
Guidelines for office computer workstations are present in many forms, from recognised international...
All authorized users have an interest in the security of the computer resources at Georgia Southern ...
Authentication is how we establish trust in monitoring systems and measurements to verify compliance...
Access to University IT resources from off-campus locations has increased due to the proliferation o...
University System of Georgia Board of Regents Policy Section 11.1 established that the Board of Rege...
These standards reflect Georgia Southern University’s implementation of The Board of Regents Busines...
The use of cyber security standards can greatly assist in the protection of process control systems ...
Access to University IT resources from off-campus locations has increased due to the proliferation o...
R926-1. Purpose: To require appropriate use of office owned IT resources for official work of the of...