Security Planning Policy and Procedures (PL-1)

The university develops, disseminates, and periodically reviews/updates formal, documented procedures to facilitate the implementation of the Security Planning policy and associated Security Planning controls.

System Security Plan (PL-2)

The university (Chief Information Security Officer) develops and implements a security plan that provides an overview of the security requirements and a description of the security controls in place or planned for meeting those requirements.

Rules of Behavior (PL-4)

The university defines scope, behavior, practices and compliance pertaining to use of information resources.