Skip to end of metadata
Go to start of metadata

1.0 Overview

Network security requires that computer equipment and data be safeguarded in a way that prevents unauthorized disclosure, misuse, alteration, destruction or other compromise of information.

2.0 Purpose

This policy is designed to lay out the steps that must be taken to electronically secure computer equipment and data at ClarksonUniversity.

3.0 Scope

This policy applies to University officials.

4.0 Policy

In order to prevent unauthorized disclosure, misuse, alteration, destruction or other compromise of information, access to all computer systems and the network must be restricted to those who have a legitimate business need to have access.  This means that all services shall be secured by the use of an appropriately configured hardware or software firewall, access control list, or other communications inhibiting mechanism.  System and administrator level accounts must be secured using strong passwords, as defined by the Password Policy.  

Specific requirements for desktop computers, servers and communications equipment are set forth in their respective security policies.  Additionally, network traffic is subject to filtering and monitoring as set forth in the Access Control and Network Monitoring Policies.  Standards for remote access are given in the Remote Access Policy.

All requirements given in the above mentioned policies shall be followed at all times.

5.0 Enforcement

6.0 Definitions