To access the details of a specific policy, select the relevant policy topic in the table below. 

Please note that as of July, 2025 this page is under going revision and consolidation. For any questions regarding this page use the contact options in the bar to the left.

CSU Information Security Policies
and Standards

Policy Number

Policy Topic

Supplemental Policies

Standards

Procedures, Guidelines, Others

8000.0

Introduction and Scope

 

 

 

8005.0

Policy Management

 

 

 

8010.0

Establishing an Information Security Program

 

 

 

8015.0

Organizing Information Security

 

CSU: 8015.S000

 

8020.0

Information Security Risk Management

 

CSU: 8020.S000
CSU: 8020.S001

 

8025.0

Privacy of Personal Information

 

 

 

8030.0

Personnel Information Security

 

CSU: 8030.S000

 

8035.0

Information Security Awareness and Training

 

CSU: 8035.S000

 

8040.0

Managing Third Parties 

 

CSU: 8040.S001

 

8045.0

Information Technology Security

 

CSU: 8045.S200
CSU: 8045.S300
CSU: 8045.S301
CSU: 8045.302
CSU: 8045.400
CSU: 8045.600

 

8050.0

Configuration Management

 

CSU: 8050.S100
CSU: 8050.S200

 

8055.0

Change Control

 

CSU: 8055.S01

8060.0

Access Control

 

CSU: 8060.S000 Access Control Standard
CSU: 8060.S000 Appendix A

8065.0

Information Asset Management

 EO1031

CSU: 8065.S001
CSU: 8065.S02
CSU: 8065.S003

8070.0

Information Systems Acquisition, Development and Maintenance

 

CSU: 8070.S000

8075.0

Information Security Incident Management

 

CSU: 8075.S000

8080.0

Physical Security

 

CSU: 8080.S01

8085.0

Business Continuity and Disaster Recovery

EO1031

 

 

8090.0

Compliance

Debit/Credit Card Payment Policy 6340.00

 

 

8095.0

Policy Enforcement

 

 

 

8100.0

Electronic and Digital Signatures

 

CSU: 8100.S01

 

8105.0

Responsible Use Policy

     

 

Updated: July 17, 2025