Know your rights and responsibilities concerning the proper and ethical use of technology on campus by reading the policies, standards and guidelines set down by federal, state and UCF policymakers on our IT Policies, Security Standards and Guidelines page.
University-wide policies, including those relating to IT, security, and compliance, can be found at https://policies.ucf.edu/
All who have access to use a networked university Multi-Function Devices (MFD) have the responsibility to ensure the overall security of the data and documents it processes. Members of the university using or administering MFDs should comply with the Data Classification and Protection policy (4-008) and the standards set forth in this document.
System banners are critical to inform potential users of a system of the terms, advisories, and consents under which they agree to use the system. These can include university policies and regulations as well as state and national laws. Further, it indicates their consent to monitoring of their usage. Finally, they outline possible consequences to violations and other unacceptable use. The UCF Information Security Office has developed the following statements to meet this need.
The Network Zones Classification outlines a simple way to classify network zones (e.g. subnets, segments, and VLANs) at UCF based on the types of systems within them.
Such a classification allows for the general description of the network standards (including network security controls) that apply to each zone, such as the degree to which each zone can connect to other zones within the UCF network, and the level of internet connectivity intended for each zone.
See below for a graphical representation of the standard.
Passwords are the most frequently utilized form of authentication for accessing a computing
resource. Due to the use of weak passwords, the proliferation of automated password-cracking
programs, and the activity of malicious hackers and spammers, they are very often also the
weakest link in securing data. Greater risks require a heightened level of protection. Passwords
must therefore follow these standards.
State and Federal Policies and Guidelines
- Florida Computer Crimes Act
Computer users shall comply with all applicable user conduct codes and rules, laws, and regulations governing the use of computer and telecommunications resources under Chapter 815, Florida Statutes, Computer Crimes Act.
- The United States Code
This is a current copy of the US Code if there is a specific federal law you want to visit.
Family Educational Rights and Privacy Act.
Digital Millennium Copyright Act contains legislation concerning the circumvention of copyright protection systems, fair use in a digital environment, and online service provider liability.
The Health Information Portability and Accountability Act.
Request further information or send your feedback to firstname.lastname@example.org.