These policies define and govern the services provided by ITS.
This policy sets forth the circumstances and process by which the University may access the content of electronic communications and files on University computer systems.It further defines boundaries for such access and in general establishes an organizational posture ensuring continuing respect for the privacy of the University community. Approved by the Office of the Provost, UAC, and University Policy Committee.
Regulations for the use of information resources and information technology systems.
Links to the Brandeis Intellectual Property Policy, and Brandeis Brand Standards (use of University fonts, seals, and logos).
January 1, 2019The policy details requirements for the retention and archival period of courses in LATTE, and best practices to backup and import course materials.
April 7, 2022
This standard outlines classifications of data needed to ensure the security and confidentiality of the information collected and maintained by the University.
April 7, 2022
This is the first foundational policy of the Brandeis Data Governance Program, which provides an organized framework (protocols, guidelines, roles/responsibilities) for the overall management of the integrity, accessibility, and security of data used at Brandeis.
Guidance on how to protect the personal information you work with from theft or inappropriate use.
The purpose of the Change Window Policy is to ensure proper notification and coordination between ITS and the Brandeis Community in the scheduling and execution of changes to production IT services.
Policies to ensure equitable use of network storage, a community resource.
Information about University compliance with the Higher Education Opportunity Act of 2008.
December 9, 2019
This policy outlines administrative, technical and physical safeguards for the protection of Regulated, Restricted, and Confidential data. In addition, this policy sets forth the University’s procedure for evaluating its electronic and physical methods of accessing, collecting, storing, using, transmitting, and protecting Regulated, Restricted, and Confidential data.