Information Technology
Lead Tex
1. Does each person with system access have a unique (not shared) user ID?
|
2. Are user ID's and passwords kept secret?
|
3. Are user passwords composed of a unique 8 to 30 alpha/numeric characters and changed at least every 90 days?
|
4. Are files of personal computers, including laptops and notebooks, backed-up on a regular basis?
|
5. Does the department maintain individual/site license documentation for all software installed or used on departmental PS's?
|
6. Is the level of IT system access assigned to each staff member regularly reviewed by management to assure that there is still a continuing need for it?
|
7. Does department management review and approved the request for access by any University employee to the University systems for which the department is responsible?
|
8. Is the required paperwork notification completed and filed before a staff member removes any IT equipment from campus for an extended period of time?
|
9. Are the hard drives of computers being disposed of, over-written to Department of Defense (DOD) standards or physically destroyed prior to be sent to Surplus?
|
10. Does the department have a documented disaster recovery/business continuation plan?
|