Official FIU IT Governance

The Security Governance provides guidance and defines responsibilities and procedures relating to the operational implementation of the university's information technology resources.

Policies

These policies serve as the foundation for the university's information security office.

Procedures

FIU users are expected to be aware of and adhere to the security procedures of computers and networks which they access. It is important for campus users to understand and practice safe computing to prevent compromising our systems and network. FIU employees are ultimately responsible for their use of computers and networked devices, and must personally take security measures to protect campus systems and data in a variety of ways.

Guidelines

FIU encourages everyone associated with the university to act in a manner that is fair, mature, respectful of the rights of others, and consistent with the educational mission of the university.

Users should be alert to and report any abnormal behavior exhibited by computers or software applications since this may indicate the existence of a malicious program undetected by anti-virus software. Help to prevent problems by reporting such activities to ITSO by e-mail (abuse@fiu.edu) or through the Phish Alert Button.

Data Classification

These policies serve as the foundation for the university's information security office.

Classification Resource Requirements
Level 1Public
  • Public websites
  • MyFIU
  • Canvas
  • FIUmail
  • OneDrive
  • Zoom
  • Teams
Level 2Internal
  • File Shares
  • ImageNow Client
  • Topaz Client
  • Graphic-Intensive Systems (i.e photoshop, autocad)
Level 3Sensitive & Confidential
  • Student Data
  • Financial Data
  • Research Data
  • Health Data
  • Personal Identifiable Data
  • Other Sensitive or Confidential Data
  • Administer Servers
  • Administer Applications
  • Administer Databases
  • Call Centers (Support Center, OneStop, Online, etc)
  • FIU managed laptop joined to AD with VPN

Please review the Remote Access checklist below to assess if you have the technology requirements needed to work remotely.

Remote Access Self-Assessment Checklist