Policies
Note: November 26, 2024
Several OIS policies have been retired and replaced by new policies. Redirects are in place to direct the reader to the appropriate new policy.
Retired policies include the following:
- Data Center Policy (Incorporated into Policy 106: Information Security Infrastructure Risk Management)
- Media Reuse and Disposal Policy (incorporated into Standard 200: Information Security Classification, Labeling, and Handling)
- Mobile Device Security Policy (incorporated into Policy 103: Information Security Device Management)
- Personal Device Security Policy (incorporated into Policy 103: Information Security Device Management)
Please contact infosec@wustl.edu with questions or feedback.
100 Information Security Program
This policy is the foundation of the policy library and provides a rationale for the directives communicated in all other information security policies.
101 Information Security Status Monitoring, Reporting, and Review
This policy communicates logging requirements for academic, clinical, administrative, research, and technical information security activities at WashU.
102 Information Security Authentication, Authorization, and Audit
This policy outlines the process for granting, managing, and reviewing access to university systems and data based on user roles during normal and emergency operations at Washington University in St. Louis (WashU).
103 Information Security Device Management
This policy outlines security expectations for all devices (e.g., laptops, mobile phones, thumb drives, external hard drives, etc.) that access the information resources of Washington University in St. Louis (WashU) and includes specific details for devices handling WashU Protected Data and Information.
104 Information Security Vulnerability Management
This policy communicates the core principles and objectives for information security vulnerability management, including planning, detection, mitigation, and patching.
105 Information Security Risk Management
This policy describes how the Office of Information Security (OIS) helps manage technical and process risks to the Confidentiality, Integrity, and Availability (CIA) of information resources at Washington University in St. Louis (WashU).
106 Information Security Infrastructure Risk Management
This policy provides guidance and directives to the computing community at Washington University in St. Louis (WashU) to ensure the ongoing Confidentiality, Integrity, and Availability (CIA) of our information resources.
107 Information Technology Business Continuity and Disaster Recovery Planning
This policy communicates the expectations for developing, maintaining, and practicing risk-based plans for Information Technology Business Continuity (ITBC) and Information Technology Disaster Recovery (ITDR).
108 Information Security Requests to Access User Content
This policy describes how the Office of Information Security (OIS) handles requests for access to content created by active or former WashU Community members.
109 Information Security Incident Reporting, Response, and Recovery
This policy communicates a planned and systematic approach to incident handling from reporting to recovery and analysis.
110 Information Technology Change Control and Management
This policy outlines processes for maintaining the security and integrity of information assets throughout their lifecycles.
111 Information Security for Software Development, Management, and Administration
This policy establishes secure application development and procurement practices for departments and schools at Washington University in St. Louis (WashU).
112 Information Security Acceptable Use
This policy outlines expectations for the appropriate use of WashU-provided information resources, ensuring that all WashU Community members understand their responsibilities.
113 Information Security Encryption
This policy specifies acceptable encryption algorithms for use with Washington University in St. Louis (WashU) data, encryption requirements for WashU Confidential and Protected Data, and acceptable key management practices, following recommendations of the National Institute of Standards and Technology (NIST).
114 Information Security Exceptions
This policy clearly communicates how the OIS handles exception requests when compliance with published policies and standards is not possible.
115 Notice of Monitoring and Information Security Investigative Practices
This policy conveys the commitment of the OIS to the responsible collection, use, and safeguarding of personal information.