IT Policy and Procedure

Policy Home | Best Practices | Policy Feedback Form

 

Introduction

The University IT Policy Web Site is the official location of IT Policies that govern our institution in the use of information technology resources.

Collaborative efforts of ITS and the Campus IT Leaders Group (CITL) are working together in the development of IT policy that best support teaching, research and service at the University of Iowa. Additional policies affecting UIHC staff may be found here.

Campus IT policies are developed through consensus or as requested by University administration through the IT Policy Development Process  ( flow chart - PDF).

Draft policies are undergoing discussion and review as part of the approval process and remain here a minimum of 90 days prior to approval. Please provide feedback regarding final draft policies prior to the approval date.

Definitions

The following terms define the scope and authority inherent in the documents (policies, standards, and best practices) by which the institution governs itself. Policies and standards directly or substantially affect procedural or substantive rights and duties of individuals that interact with the University.

Policy: A "Policy" is a high-level document accepted and approved by executive management that is used to establish requirements for a particular issue, regardless of whether the issue is reflective of technology, people, processes or principles.

Standard: A "Standard" is a high-level document accepted and approved by executive management used to establish strong recommendations for a particular issue.  They may be developed and adopted locally or through external organizations such as ISO (International Organization for Standards) or IEEE (Institute of Electrical and Electronics Engineers). Standards often develop into policy statements over time.

Best Practice:  A "Best Practice" is a resource promoted by management as a recommendation. Best practices are developed by subject matter experts either locally or through external groups, vendors, or a combination. Best practices may develop into standards as they mature.

Please send your comments, questions, and suggestions for improvement of this site to it-security@uiowa.edu