ÍÃ×ÓÏÈÉú

Skip Navigation

Information Governance, Security, & Technology Policies

Learn about the policies related to the management of University of Maryland Global Campus information resources and information governance, including but not limited to acceptable use, information security, data privacy, and records management. Defined terms are capitalized throughout these policies and may be found in the Information Governance Glossary.

Policy NumberPolicy Title
USM X-1.00
ÍÃ×ÓÏÈÉúX-1.01ÍÃ×ÓÏÈÉúPolicy on Information Governance
ÍÃ×ÓÏÈÉúX-1.02ÍÃ×ÓÏÈÉúPolicy on Data Classification
ÍÃ×ÓÏÈÉúX-1.03

ÍÃ×ÓÏÈÉúPolicy on Records and Information Management

ÍÃ×ÓÏÈÉúP-X-1.03: Procedures for ÍÃ×ÓÏÈÉúPolicy on Records and Information Management

ÍÃ×ÓÏÈÉúX-1.04ÍÃ×ÓÏÈÉúPolicy on ÍÃ×ÓÏÈÉúPolicy on Information Security
ÍÃ×ÓÏÈÉúX-1.05ÍÃ×ÓÏÈÉúPolicy on Information Security Awareness and Training
ÍÃ×ÓÏÈÉúX-1.06ÍÃ×ÓÏÈÉúPolicy on Information Security Incident Response
ÍÃ×ÓÏÈÉúX-1.07ÍÃ×ÓÏÈÉúPolicy on Information Security Audit and Accountability
ÍÃ×ÓÏÈÉúX-1.08ÍÃ×ÓÏÈÉúPolicy on IT Resources Configuration Management
ÍÃ×ÓÏÈÉúX-1.09ÍÃ×ÓÏÈÉúPolicy on IT Disaster Recovery
ÍÃ×ÓÏÈÉúX-1.10ÍÃ×ÓÏÈÉúPolicy on Identity and Access Management
ÍÃ×ÓÏÈÉúX-1.11ÍÃ×ÓÏÈÉúPolicy on Remote Access
ÍÃ×ÓÏÈÉúX-1.12ÍÃ×ÓÏÈÉúPolicy on Acceptable Use
ÍÃ×ÓÏÈÉúX-1.13ÍÃ×ÓÏÈÉúPolicy on Employee IT Security
ÍÃ×ÓÏÈÉúX-1.14ÍÃ×ÓÏÈÉúPolicy on Media Protection
ÍÃ×ÓÏÈÉúX-1.15ÍÃ×ÓÏÈÉúPolicy on Maintenance of Information Systems and Technology Resources
ÍÃ×ÓÏÈÉúX-1.16ÍÃ×ÓÏÈÉúPolicy on Security Assessment of Information Systems and Technology Resources
ÍÃ×ÓÏÈÉúX-1.17ÍÃ×ÓÏÈÉúPolicy on Situational Awareness of Information Systems and Technology Resources
ÍÃ×ÓÏÈÉúX-1.18ÍÃ×ÓÏÈÉúPolicy on Information Security Risk Management
ÍÃ×ÓÏÈÉúX-1.19AÍÃ×ÓÏÈÉúPolicy on Account Management (ÍÃ×ÓÏÈÉúLearner Community)
ÍÃ×ÓÏÈÉúX-1.19BÍÃ×ÓÏÈÉúPolicy on Account Management (ÍÃ×ÓÏÈÉúWorkforce)
ÍÃ×ÓÏÈÉúX-1.20ÍÃ×ÓÏÈÉúPolicy on Payment Card Industry – Data Security Standards (PCI-DSS) Compliance
ÍÃ×ÓÏÈÉúX-1.21ÍÃ×ÓÏÈÉúPolicy on Information System and Communication Protection
ÍÃ×ÓÏÈÉúX-1.22ÍÃ×ÓÏÈÉúPolicy on System and Information Integrity
ÍÃ×ÓÏÈÉúX-1.23ÍÃ×ÓÏÈÉúPolicy on Physical Security of Information Technology
ÍÃ×ÓÏÈÉúX-1.24ÍÃ×ÓÏÈÉúPolicy on IT Asset Management
ÍÃ×ÓÏÈÉúX-1.25ÍÃ×ÓÏÈÉúPolicy on Mobile Devices
ÍÃ×ÓÏÈÉúX-1.26ÍÃ×ÓÏÈÉúPolicy on Electronic Mail
ÍÃ×ÓÏÈÉúX-1.27ÍÃ×ÓÏÈÉúPolicy On Third Party Vendor Management
ÍÃ×ÓÏÈÉúX-1.28ÍÃ×ÓÏÈÉúPrivacy Policy
ÍÃ×ÓÏÈÉúX-1.29ÍÃ×ÓÏÈÉúPolicy on Gramm-Leach-Bliley Act (GLBA) Compliance