Skip to main content
Florida State University Home Florida State University Home

FSU | Information Technology Services

  • Webmail
  • Search FSU
  • Navigation

  • Home
  • Services
  • Cybersecurity
    • Phish Tank
    • Protect Yourself
    • Protect FSU
    • Standards
  • Research
    • Governance
    • RCC User Accounts
    • RCC Account Login
    • RCC Documentation
    • RCC Training
  • About ITS
    • Leadership
    • Planning
    • Initiatives
    • Partnerships
    • News
    • Publications
    • Metrics
    • Policies
    • Contact
  • Help
    • myFSU Service Center
    • Classroom Support
    • IT Support
    • Training
    • FAQs
  • Academics
  • Admissions
  • Research
  • Faculty
  • Students
  • Veterans
  • Support FSU
Information Technology Services

  • Home
  • Services
  • Cybersecurity
    • Phish Tank
    • Protect Yourself
    • Protect FSU
    • Standards
  • Research
    • Governance
    • RCC User Accounts
    • RCC Account Login
    • RCC Documentation
    • RCC Training
  • About ITS
    • Leadership
    • Planning
    • Initiatives
    • Partnerships
    • News
    • Publications
    • Metrics
    • Policies
    • Contact
  • Help
    • myFSU Service Center
    • Classroom Support
    • IT Support
    • Training
    • FAQs
One male and two females working together in a study room.
  1. Home
  2. Cybersecurity
  3. Standards

Standards

FSU has established standards that provide security and privacy requirements and best practices that support and supplement FSU Technology Policies. These requirements and best practices preserve the confidentiality, integrity and availability of the university’s information technology assets and safeguard these assets from unauthorized access or threats that could harm the university or members of the university community.

4-OP-H-25.01 Data Security Standard

Defines security and privacy requirements for protecting the confidentiality, integrity and availability of FSU information that is accessed, collected, stored, processed or transmitted by users

More 

4-OP-H-25.02 Information Privacy Standard

Establishes a university-wide privacy program that respects and protects the privacy of students, alumni, faculty and staff, and safeguards information resources from loss, misuse and unauthorized access or modification

More 

4-OP-H-25.03 IT Security Configuration Management Standard

Sets requirements for implementing and maintaining secure configurations for IT assets to minimize operational malfunctions, external threat intrusions and vulnerabilities and unauthorized data disclosures

More 

4-OP-H-25.04 IT Network Security Standard

Monitors and protects the university’s IT networks and associated systems, services and applications from abuse, attacks and inappropriate use

More 

4-OP-H-25.05 Bring Your Own Device Standard

Provides requirements for the use of personally owned devices that connect to FSU technology resources, conduct FSU business or interact with internal university networks and business systems

More 

4-OP-H-25.06 IT Security and Privacy Training Standard

Identifies baseline IT training requirements for all users, based on users’ roles, responsibilities and their access to FSU data and IT resources

More 

4-OP-H-25.07 IT Access, Authorization and Authentication Standard

Defines identity management and access controls that protect IT resources from unauthorized use or access to devices, systems, services and applications

More 

4-OP-H-25.08 IT Physical Security Standard

Describes the requirements for protecting campus facilities that host university information resources from threats, including the risk of loss, theft, damage, interruption or unauthorized access

More 

4-OP-H-25.09 IT Vulnerability Management Standard

Establishes a framework for identifying, assessing and remediating IT vulnerabilities on devices connected to FSU networks that could cause a significant threat to the university network and other IT resources

More 

4-OP-H-25.10 IT Log Collection, Analysis and Retention Standard

Provides guidance of the maintenance of log data which assists with detecting, analyzing, preventing and responding to potential information security incidents related to FSU systems

More 

4-OP-H-25.11 IT Incident Response Standard

Outlines the requirements for detecting, analyzing, prioritizing and handling IT security incidents to minimize the loss of information and disruption of services caused by an incident

More 

4-OP-H-25.12 IT Disaster Recovery Planning Standard

States the requirements for IT disaster recovery planning to facilitate the timely recovery and restoration of FSU IT systems that support access to critical business functions and data

More 

4-OP-H-25.13 IT Third-Party Vendor Management Standard

Explains the requirements necessary to ensure contracts and agreements with third parties involving IT resources, cloud or other outsourced services guarantee compliance with FSU security policies and standards

More 

4-OP-H-25.14 Encryption Standard

Defines requirements for the use of encryption technologies to protect FSU data and resources that are stored or transmitted over networks

More 

4-OP-H-25.15 IT Data Disposal and Media Sanitization Standard

Delineates the requirements for proper disposal of electronic data and media to prevent unauthorized access to or disclosure of institutional information

More 

4-OP-H-25.16 IT Application Secure Coding Standard

Ensures IT applications developed or administered by FSU reflect secure coding practices to reduce the likelihood of unauthorized disclosure or theft of sensitive institutional information

More 

4-OP-H-25.17 IT Enterprise Integration Security Standard

Provides requirements for integration with IT enterprise systems that minimize the vulnerability of systems to external attacks, unauthorized disclosure of information and unauthorized access to interfaces or system configurations

More 

4-OP-H-25.18 Risk Management Standard

Establishes requirements for risk management through security assessment and planning as required by regulations with which the university must comply

More 

4-OP-H-25.19 Defining Consolidated University Units Standard

Identifies an IT security and privacy organizational structure and establishes roles and responsibilities to facilitate more effective university-wide IT risk management

More 

Resources

4-OP-H-25.20 Request for Exception to IT Security Policy

Method for requesting an exception of FSU IT security or privacy policy requirements to address circumstances where strict compliance cannot be met

More 

IT Roles and Responsibilities

Defines key roles and responsibilities related to IT security and privacy policies and standards

More 

IT Glossary

Alphabetical list of terms and definitions for words and titles used throughout IT standards

More 

  • Contact Us
    •    FSU Service Status
    •   myFSU Service Center
    •   850-644-4357
    •  Chat
    •   M-F 8AM-5PM
  • Students
  • Faculty
  • FSU ITS
  •   Staff  
  •  IT Pros 
  •  Facebook
  •  Instagram
  •  Twitter
  •  YouTube
  •  LinkedIn

Information Technology Services · 1721 W Paul Dirac Drive · Tallahassee, FL 32310

© Florida State University
Tallahassee, FL 32306

FSU Directory Assistance
Questions or Comments

Privacy Policy
Copyright

  • Like Florida State on Facebook
  • Follow Florida State on Instagram
  • Follow Florida State on X
  • Follow Florida State on Youtube
  • Connect with Florida State on LinkedIn
  • More FSU Social Media

Cookie Preferences