Policies and Guidelines

Information Technology's computing policies, guidelines and standards apply to security, the central server and starting a web server.

Reference Guide

This reference guide contains links to existing policies, IT guidelines, and IT contact information put together to help colleges and divisions better manage their IT resources.

Purpose of this Reference Guide.

Backup and Disaster Recovery. System backups are an essential part of information technology security. Backups insure that a department's critical data can be recovered in the event of a major security incident or disaster.

Disaster recovery insures that a department can recover assets and continue functioning in the face of a serious, possibly total disruption or system failure.

Physical Security. Physical Security is how a system is protected from tampering, exposure to the elements or any other factors that might cause physical damage or failure.

Logical Security. Logical Security is how a system is protected at the Operating System (OS) and Application Level. This is usually considered protection from hacking, but also means protecting systems from unintentional mistakes, such as accidental deletion of important system or application files.

Appropriate Use of Computing Resources. Appropriate and responsible use of the University of Houston computing and networking facilities is defined as use that is consistent with the teaching, learning, research and administrative objectives of the University and with the specific objectives of the project or task for which such use was authorized. All uses inconsistent with these objectives are considered to be inappropriate use.