skip to content
  • Calendar
  • Maps

Documents

Weber State University provides some basic documentation to help you stay in compliance with many aspects related to Information Security. This is not a comprehensive list but this will provide you with the most common information.

Policies

A policy is typically a document that outlines specific requirements or rules that must be met. In the information/network security realm, policies are usually point-specific, covering a single area.

University policies are intended to be in accordance with federal and state laws and regulations regarding safe computing.

Policies

Standards

The following security standards will help define some common topics and practices.

Standards

Peer-to-Peer (P2P) Compliance

The Higher Education Opportunity Act (HEOA) contains provisions for the regulation of P2P applications when used in ways that infringe on the copyrights of commercial works.

Several sections of the HEOA deal with the unauthorized file sharing on campus networks, imposing three general requirements on all U.S. colleges and universities.

HEOA P2P Compliance

Software Agreements

End User License Agreements (EULA) cover how software is supposed to be handled. These agreements are legally binding so it is necessary that you read and understand the content in a software agreement. Software agreements are legally binding. It is important that you read the EULA before you install any software as they may put your privacy and computer at risk.

Software Agreements