Policies, Guidelines, and Regulations
Having trouble? Use our self-help articles below to find answers to your technology questions and issues. If you cannot find your answer, please fill out a support request here. If you have any suggestions for content to add, feel free to email us at support@eiu.edu
Eastern Illinois University information security guidelines refer to the recommended actions and operational guides to users, IT staff, operations staff, and others when a specific standard does not apply.
Eastern Illinois University information security policies refer to the mandatory activities, actions, rules, or regulations and are usually in relation to technology. A baseline defines the minimum standard that must be met.
- Acceptable Use
- Authentication
- Biometric Policy
- Bring Your Own Device Policy
- Contingency Planning
- Copyright Policy
- Email Collaboration and Communications
- E-Number
- Gramm-Leach-Bliley Act Policy
- Identification
- Network Identity Life-Cycle
- EIU Network Use Policy
- Remote Access Control
- Reporting Child Pornography
- Security Assessment Configuration Review
- Security Awareness Training
- Security Incident Response
- Server Roles and Responsibilities
Eastern Illinois University information security regulations refer to the mandatory technical, physical, and administrative controls for data which is classified under the following regulations. A baseline defines the minimum standard that must be met.