Skip to main content
Register for Fall Semester

Policy, Standards, & Procedures

Information Security - Documents

Last updated January 4, 2012

This page contains all approved Information Security Standards & supporting documents.

CSCC Data Protection - Document linking the following items to existing CSCC policy/procedures/program documentation: HIPAA, FERPA, PCI (Payment Card Industry), Red Flag (Identity Theft Program), Records Retention & Disposal, Information Technology Policy, Information Security Web Site, and the Information Security Standard.

Information Security Standard- The Information Security Standard contains guidance and minimal baselines for several components of the CSCC infrastructure.

Red Flag Program- The CSCC Board of Trustees formally approved this document on May 27, 2010 (Active June 1, 2010).

Laptop Standard- The laptop standard covers required hardware, software, and the responsibilities of the end user/owning department.

Identity Verification Decision Model - Used to ensure the person on the phone is truly who they say they are.

Data Destruction Standard - Best practices to ensure proper data destruction.

Network Systems Firewall Change Request Form * - Request form to properly request and document changes to CSCC's firewall.


Information Technology Policies & Procedures

15-01: CSCC technology usage policy

15-01 (C): College-wide procedure for the management of college computer data networks, both on- and off-campus; all equipment housed at the college; and the resources they make available

15-01 (K): College Web presence

15-01 (M): Information Security Committee