Skip to main content
Skip to main site menu
University Information Security Office
Search
Menu
Search this site
Close the search box
×
Search
Requests for UIS Services
Security Standards
Toggle sub-navigation
Close this sub-navigation
Security Standards for Georgetown Technology
Risk Classifications for Georgetown Assets and Data
Toggle sub-navigation
Minimum Security
Toggle sub-navigation
Security Considerations for Cloud Services
Toggle sub-navigation
Be Cyber Smart!
Close
Requests for UIS Services
Open sub-navigation
Close sub-navigation
Security Standards
Open sub-navigation
Close sub-navigation
Security Standards for Georgetown Technology
Open sub-navigation
Close sub-navigation
Risk Classifications for Georgetown Assets and Data
Open sub-navigation
Close sub-navigation
Minimum Security
Open sub-navigation
Close sub-navigation
Security Considerations for Cloud Services
Open sub-navigation
Close sub-navigation
Be Cyber Smart!
Open sub-navigation
Close sub-navigation
100. University Security
Home
▸
100. University Security
UIS.102 Computer Systems Acceptable Use Policy
Guidelines in Support of the Acceptable Use Policy
Guidelines on Network Extensions
Transmission of Messages via Broadcast Communications
Georgetown University Information Security Policy
UIS.104 HEOA DMCA Policy
Peer-to-Peer File Sharing Guidelines
InCommon Federation Declaration