Skip to Content
Skip to Main Navigation
Skip to Search
Indiana University Bloomington
Indiana University Bloomington
IU Bloomington
Menu
Faculty
Faculty Policies
Faculty Guides
Students
Handbooks
Guides
Business
Student Financial Aid
Accounting and Reporting
Travel
Purchasing
Procurement Card / P-Card
Out of Pocket Reimbursement
Hospitality
Event Planning Guidelines
Luddy Alcohol and Entertainment Policy
Guidelines for ADR Events Sponsorship
Payroll
Hiring Temporary Staff Employees
Hiring students and academic appointees
Contracts and Grants
Services
Reporting
Resources
IT
IT Policies
IT Guides
How do I ask for help with a Luddy School technology or facilities issue?
Luddy School Storage Services and Sensitive Data
Luddy Web Hosting Options
New Luddy Employees
HR Onboarding Process
Luddy Policies and Guides
Home
Faculty
Faculty Policies
Faculty Guides
Students
Handbooks
Guides
Business
Student Financial Aid
Accounting and Reporting
Travel
Purchasing
Event Planning Guidelines
Payroll
Hiring Temporary Staff Employees
Hiring students and academic appointees
Contracts and Grants
Services
Reporting
Resources
IT
IT Policies
IT Guides
New Luddy Employees
Home
IT
IT Policies
Luddy Information Technology Policies
Policy Name
Policy creation, review, approval, and revision
Data awareness/management of institutional data
Account management
Backups
Laboratory safety
Mobile device security
Problem resolution and service desk
Public IP addresses
Server security
Senstive data policies and email encryption
Institutional data managment policy pertaining to GEMS
Virtual machines and physical servers
Workstation security
Administrator access and self-managed systems
Faculty/staff computer lifecycle
Hardware and system inventory
Incident response
IT Purchasing at Luddy
System and media disposal
Vulnerability scans
Business continuity
Yearly process review
Disaster recovery
Server logging
Network management
Change management
IT Policies
IT Guides
Luddy Policies and Guides resources and social media channels
Luddy School of Informatics, Computing, and Engineering
Twitter
Facebook
YouTube
LinkedIn