Information Technology (IT) is committed to providing the technological resources necessary to create a world-class learning and teaching environment for Weber State University through careful and thoughtful planning and execution. Policies executed to allow an open and collaborative environment to protect our most vital information resources. These elements are critical in providing long-lasting, productive, and synergistic changes to the University computing environment.
Managing the vast information technology resources required to sustain staff functions and student learning can be challenging. To do this effectively, IT has developed and continues to refine a set of Policies, Standards, Procedures, and Guidelines to govern how we do business.
Please get in touch with the the Project and Strategy Architect if you have any questions (njarvis@weber.edu).
Note: You must be logged in to eWeber to view these forms.
Policy and Procedure Manual (PPM) for IT
Section 10-3
Section 10-4
Section 10-5
Section 10-6
Section 10-7
Standards & Guidelines
Center for Internet Security (CIS) Critical Security Controls (CSCs)
The following appendices correspond to each CIS CSC Standard:
Appendix A: Acronyms and Abbreviations
Appendix B: Glossory
CIS CSC 9: Email and Web Browser Protections
CIS CSC 11: Data Recovery
CIS CSC 16: Application Software Security
CIS CSC 18: Penetration Testing
