System Offices Cybersecurity Procedures and Standards
Cybersecurity Procedures and Standards guide the IT organization and The Texas A&M University System Offices in execution of cybersecurity administration. They are specific to System Offices and supplement A&M System policies and regulations.
29.01.99.S0.01 | Web Accessibility and Usability Procedures | |
Acceptable Use | ||
Account Management | ||
Administrator and Special Access | ||
Authorized Software | ||
Backup and Recovery | ||
Change Management | ||
Data Breach Reporting | ||
Data Classification and Data Protection | ||
Disaster Recovery | ||
Employee Instant Messaging | ||
Encryption of Confidential and Sensitive Information | ||
Exclusions from Required Risk Mitigation Measures | ||
Incident Management | ||
Information Security Risk Assessment Reviews | ||
Internet and Intranet Usage | ||
Intrusion Detection | ||
Malicious Code | ||
Network Configuration | ||
Notification of Unauthorized Access, Use, or Disclosure of Sensitive Personal Information | ||
Password Authentication | ||
Physical Access | ||
Portable Devices | ||
Privacy | ||
Security Awareness and Training | ||
Security Monitoring | ||
Security Surveillance | ||
Server Hardening | ||
System Development and Acquisition | ||
Use of Peer-To-Peer File Sharing Software | ||
Vendor Access | ||
Web Accessibility and Usability | ||
Wireless Access |