Skip to main content Skip to main site menu
Georgetown University.
Georgetown University.
University Information Security Office
Close the search box ×
  • UISO Requests
  • Security Standards
    • Security Standards for Georgetown Technology
    • Risk Classifications for Georgetown Assets and Data
    • Minimum Security
    • Security Considerations for Cloud Services
  • Technology Policies
    • 100. University Security
    • 200. Information Systems Security
    • 300. Identity & Access Security
    • 400. Data Security
    • 500. 3rd-Party Security
    • 600. Regulated Data Security
  • News & Announcements
    • News & Announcements
    • Phishing Alerts
    • Blog
    • Archived News
  • Be Cyber Smart!
  • UISO Requests
  • Security Standards
    • Security Standards for Georgetown Technology
    • Risk Classifications for Georgetown Assets and Data
    • Minimum Security
    • Security Considerations for Cloud Services
  • Technology Policies
    • 100. University Security
    • 200. Information Systems Security
    • 300. Identity & Access Security
    • 400. Data Security
    • 500. 3rd-Party Security
    • 600. Regulated Data Security
  • News & Announcements
    • News & Announcements
    • Phishing Alerts
    • Blog
    • Archived News
  • Be Cyber Smart!
Skip contextual nav and go to content
Navigate to...    
  • Technology Policies
    • 100. University Security
    • 200. Information Systems Security
    • 300. Identity & Access Security
    • 400. Data Security
    • 500. 3rd-Party Security
    • 600. Regulated Data Security
Home ▸ Technology Policies

Technology Policies

The Georgetown University Information Security policies, supporting guidelines, and associated procedures have all been designed to adhere to the NIST Cyber Security Framework and its related Special Publications. UIS is charged with providing the tools and controls necessary to best ensure the confidentiality, integrity, availability, privacy and security of the University and all its assets and data.

100. General Security Policies

– HEOA DMCA Policy

– Information Security Policy

Computer Systems Acceptable Use Policy

200. System Security Policies

– IT Hardware Assets Mgt Policy
– Software Applications Mgt Policy
– Configuration Mgt Policy
– Vulnerability Mgt Policy
– Audit Logging Policy

300. Identity and Access Policies

– Elevated Privileges Mgt Policy

– Two-Factor Authentication

400. Data Security Policies

– Data Classification Guidelines
– Data Handling Guidelines
– Research Data Guidelines
– Security Risk Classifications for Data
– Report a Data Security Incident

500. IT Vendor Policies

– Technology Vendor Security Policy

600. Regulated Data Policies

– Using Zoom for Telehealth

– PCI Security
– HIPAA Security

Georgetown University seal.

University Information Security Office

University Information Services

2115 Wisconsin Avenue

Washington D.C. 20007

  • Maps
  • Copyright
  • Privacy
  • Accessibility
  • Notice of Non-Discrimination
  • Full Site Menu