• Skip to Content
• Skip to Extra Content
• Georgetown University
•
•
•
•
Search
Site Index
Directory
About
Georgetown University
Technology Policies & Guidelines
Search Technology Policies search • University Policies
• » Technology Policies
Georgetown University Information Security Policy
Approved May 13, 2003 by the President's Executive Committee
Table of Contents
• STATEMENT
◦ Purpose
◦ Scope
• PHILOSOPHY
• RESPONSIBILITIES
◦ Stewards
◦ Users
◦ Managers (of Users)
◦ Information Service Providers
◦ University Information Security Officer
◦ Local Information Security Personnel
◦ Internal Audit and Management Analysis Department
◦ University Counsel's Office
• ENFORCEMENT
• RESOURCES
• APPROVAL HISTORY
• REVIEW CYCLE
• Information Security Policy Review Committee
• Information Services Management Council (ISMC)
1.
http://policies.georgetown.edu/31707.html
09/10/2012
Georgetown University Information Security Policy : Technology (Georgetown Unive... Page 2 of 16
I. STATEMENT
2.
Purpose
3. The Georgetown University Information Security Policy (the "Policy") serves to create an environment that will help protect all members of the Georgetown University community
(the "University") from information security threats that could compromise privacy, productivity, reputation, or intellectual property rights. The Policy recognizes the vital role information plays in the University's educational, research, operational, and medical advancement missions, and the importance of taking the necessary steps to protect information in all forms. As more information is used and shared by students, faculty and staff, both within and outside the University, a concomitant effort must be made to protect information. The Policy serves to protect information resources from threats from both within and outside of the