Governance, Compliance & Security

Information Security Best Practices, Identity Theft Protection Committee (ITPC) FAQs, File Sharing, Passphrase Security Standards, Software Licensing Agreements and Compliance

Categories (2)

Policies, Guidelines, Terms & Conditions

Important Policies, Guidelines, Regulations and Terms & Conditions related to the Web, Software, Systems, and Sensitive Data

User Security

Report a security concern, make your passphrase more secure and catch up on vishing, phishing and information security best practices.

Articles (9)

AMP for EndPoints Malware Protection

Cisco AMP for Endpoints is a cloud-based malware protection software installed on ECU-managed computers.

FAQ - Identity Theft Protection Committee (ITPC)

Answers to questions on using, storing and disposing of social security numbers and the SSN/PII regulation.

Information Resources Coordinating Council (IRCC)

The IRCC is the campus-wide committee advises the CIO on information technology at ECU.

IT Accessibility Compliance

See these resources to ensure compliance with ECU's accessibility compliance program.

IT Governance

The IT governance structure is designed to create transparency in decision making and establish committee and cross-campus communication.

Media Consent

Written permission is often required when including students, patients and others in research, project or promotional videos.

Software Licensing Agreements and Compliance

Staff who use an ECU-managed computer are required to maintain a software inventory as well as proof of purchase for software licenses.

Web Compliance

If you manage web content on the domain, see this article on required compliance with federal and state laws and ECU policy.