Skip to main content Skip to main site menu
Georgetown University.
Georgetown University.
University Information Security Office
Search Menu
× Close the search box
  • Requests
  • Security Standards
    • Security Standards for Georgetown Technology
    • Risk Classifications for Georgetown Assets and Data
    • Minimum Security
    • Security Considerations for Cloud Services
  • Technology Policies
    • 100. University Security
    • 200. Information Systems Security
    • 300. Identity & Access Security
    • 400. Data Security
    • 500. 3rd-Party Security
    • 600. Regulated Data Security
  • News & Announcements
    • Phishing Examples
    • Cyber Alerts
    • Blog
    • Archived News
  • Awareness
    • GDPR
    • Online Best Practices
    • Password Security
    • Phishing
    • Ransomware
    • Teleworking
    • Travel Tips
    • UISO Cyber Security Newsletter
  • Requests
  • Security Standards
    • Security Standards for Georgetown Technology
    • Risk Classifications for Georgetown Assets and Data
    • Minimum Security
    • Security Considerations for Cloud Services
  • Technology Policies
    • 100. University Security
    • 200. Information Systems Security
    • 300. Identity & Access Security
    • 400. Data Security
    • 500. 3rd-Party Security
    • 600. Regulated Data Security
  • News & Announcements
    • Phishing Examples
    • Cyber Alerts
    • Blog
    • Archived News
  • Awareness
    • GDPR
    • Online Best Practices
    • Password Security
    • Phishing
    • Ransomware
    • Teleworking
    • Travel Tips
    • UISO Cyber Security Newsletter
Skip contextual nav and go to content
  • Technology Policies
    • 100. University Security
    • 200. Information Systems Security
    • 300. Identity & Access Security
    • 400. Data Security
    • 500. 3rd-Party Security
    • 600. Regulated Data Security
Home ▸ Technology Policies

Technology Policies

The Georgetown University Information Security policies, supporting guidelines, and associated procedures have all been designed to adhere to the NIST Cyber Security Framework and its related Special Publications. UIS is charged with providing the tools and controls necessary to best ensure the confidentiality, integrity, availability, privacy and security of the University and all its assets and data.

100. General Security Policies

Technology Acceptable Use
HEOA DMCA Policy
Information Security Policy

200. System Security Policies

IT Hardware Assets Mgt Policy
Software Applications Mgt Policy
Configuration Mgt Policy
Vulnerability Mgt Policy
Audit Logging Policy

300. Identity and Access Policies

Elevated Privileges Mgt Policy

Two-Factor Authentication

400. Data Security Policies

Data Classification Guidelines
Data Handling Guidelines
Research Data Guidelines
Security Risk Classifications for Data
Report a Data Security Incident

500. IT Vendor Policies

Technology Vendor Security Policy

600. Regulated Data Policies

PCI Security
HIPAA Security

Georgetown University seal.

University Information Security Office

3300 Whitehaven Street, NW

Washington D.C. 20007

Phone: (202) 687-3031

Email: security@georgetown.edu

  • Maps
  • Copyright
  • Privacy
  • Accessibility
  • Full Site Menu