Rules of Behavior | PL-4

Description

  • Use of system resources is documented in the Âé¶¹´«Ã½Ó³»­ Acceptable Use Policy. These documents provide policies describe the rules that govern the appropriate use of all Âé¶¹´«Ã½Ó³»­-owned or maintained information resources for Âé¶¹´«Ã½Ó³»­ users, including employees, contractors, and other system users.
  • The Cybersecurity Manager or their designee is responsible for reviewing and updating the Acceptable Use Policy periodically.

Last updated: 3/11/2024

Contact Hours


Questions?