• Electronic Data Backup Policy

      Information Technology Support and Services; Georgia Health Sciences University (2015-12-18)
      Georgia Health Sciences University maintains a large and growing body of data stored exclusively in electronic form. Much of these data are critical to the operation of the University, and it is clear that the University could suffer significant loss should an important set of data be permanently lost.
    • Electronic Mail Retention, Backup, and Recovery Policy

      Information Technology Support and Services; Georgia Health Sciences University (2015-12-18)
      To establish a retention and backup policy and procedure related to electronic mail
    • Information Systems Security and Computer Usage Policy

      Information Technology Support and Services (2015-12-18)
      Georgia Health Sciences University Information Systems Security and Computer Usage Policy is to be used in conjunction with existing GHSU policies and procedures. Each individual is responsible for the appropriate use and protection of information systems resources. Each manager/supervisor is responsible for appropriate enforcement of the policy in conjunction with normal supervisory activities.
    • Mobile Device and Remote Access Policy

      Information Technology Support and Services (2012-10)
      Georgia Health Sciences Medical Center (GHSMC), Georgia Health Sciences Medical Associates (GHSMA), and Georgia Health Sciences University (GHSU), collectively “GHS” discourages the storage of electronic Protected Health Information (ePHI) as well as other forms of confidential information on mobile devices. The Institution recognizes that incidental storage may occur through normal business activities; therefore, devices used for official business must adhere to the controls outlined in this policy.
    • Password Protection Policy

      Information Technology Support and Services; Georgia Health Sciences University (2005-12)
      Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may result in the compromise of critical GHSU resources. As such, all GHSU faculty, staff and students (including contractors and vendors with access to GHSU systems) are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords.
    • Remote Access Policy

      Information Technology Support and Services; Georgia Health Sciences University (2005-12)
      The purpose of this policy is to define standards for connecting to Georgia Health Sciences University’s (GHSU) network from any remote host. These standards are designed to minimize the potential exposure to GHSU from damages that may result from unauthorized use of enterprise resources. Damages include the loss of sensitive or confidential data, intellectual property, damage to public image, damage to critical internal systems, etc.
    • Server Security Policy

      Information Technology Support and Services; Georgia Health Sciences University (2005-12)
      The purpose of this policy is to establish standards for the base configuration of server equipment that is owned and/or operated by GHSU. Effective implementation of this policy will minimize unauthorized access to GHSU proprietary information and technology.
    • Workstation Configuration Policy

      Information Technology Support and Services; Georgia Health Sciences University (2005-12)
      The purpose of this document is to establish standards for the base configuration of workstation computers that are authorized to operate within Georgia Health Sciences University. Since data that is created, manipulated and stored on these systems may be proprietary, sensitive or legally protected, it is essential that the computer systems and computer network, as well as the data they store and process, be operated and maintained in a secure environment and in a responsible manner. It is also critical that these systems and machines be protected from misuse and unauthorized access. Therefore, ITSS requires that all access to workstations be authorized and that all data be safeguarded