Skip to Content

Division of Information Technology

Policies & Procedures

This webpage serves as the central location for all Division of IT governance documents. Only Division-level governance materials appear here; campuses or departments shall maintain their own internal procedures and practices separately as long as they do not conflict with University and Division of IT policy. 

Note: The Division of Information Technology publishes official IT governance materials on this webpage, including policies and the supporting procedures, standards and guidelines. Division of IT policies are authorized by the Vice President for Information Technology and Chief Information Officer and are developed and reviewed through the University’s established policy approval process. UNIV 1.00 Policy on Policies: Development and Oversight of University Policies, governs the development and oversight of all formal university policies.


Policies & Procedures

A policy is a high-level, mandatory directive that defines an organization's stance on a specific IT-related topic (e.g., security, data privacy, access control). Whereas a procedure is a step-by-step, operational process that outlines how to implement a policy or standard.

Policy Procedure(s) Scope Keywords
(hidden column)
IT 1.00 [pdf] - Information Technology Procurement   USC System tag 1, tag2
IT 3.00 [pdf] - Information Security IT 3.00 Procedure [pdf] - Information Security USC System  
IT 5.00 [pdf] - Digital Accessibility IT 5.00 [pdf] - Digital Accessibility USC System  
UNIV 1.51 [pdf] - Data and Information Governance UNIV 1.51 [pdf] - Data and Information Governance USC System  
UNIV 1.52 [pdf] -Responsible Use of Data, Technology, and User Credentials   USC System  

Standards

A standard is a detailed, measurable requirement that supports a policy by defining specific rules, technologies or configurations to be followed. Must be a licensed technician in ServiceNow to access standards, such as an IT Manager.

Standard Name Policy Keywords
(hidden column)
Email Security Configuration Standard IT 3.00 tag 1, tag2
Security Monitoring Standard IT 3.00  
Vulnerability Management Standard IT 3.00  
Technical Security Configuration Standard IT 3.00  
Asset Management Standard IT 3.00  
Account Management Standard IT 3.00  

Guidelines

A guideline is a recommended best practice that provides flexibility and guidance for achieving compliance.

Guideline Namea
Using AI in Meetings Guidelines
Purchasing AI Guidelines

Challenge the conventional. Create the exceptional. No Limits.

©