Last updated January 4, 2012
This page contains all approved Information Security Standards & supporting documents.
CSCC Data Protection - Document linking the following items to existing CSCC policy/procedures/program documentation: HIPAA, FERPA, PCI (Payment Card Industry), Red Flag (Identity Theft Program), Records Retention & Disposal, Information Technology Policy, Information Security Web Site, and the Information Security Standard.
Information Security Standard - The Information
Security Standard contains guidance and minimal baselines for
several components of the CSCC infrastructure.
Red Flag Program - The CSCC Board of Trustees formally approved this document on May 27, 2010 (Active June 1, 2010).
Laptop Standard - The laptop standard covers required hardware, software, and the responsibilities of the end user/owning department.
Identity Verification Decision Model - Used to ensure the person on the phone is truly who they say they are.
Data Destruction Standard - Best practices to ensure proper data destruction.
Network Systems Firewall Change Request Form * - Request form to properly request and document changes to CSCC's firewall.
Information Technology Policies & Procedures
15-01: CSCC technology usage policy
15-01 (K): College Web presence
15-01 (M): Information Security Committee