What are the rules regarding computer security at JMU?
Policy 1207 Appropriate Use of Information Technology Resources Policy 1201 Information Technology Resource Management Policy 1202 Systems Implementation & Project Management Policy 1203 End-User Computing Policy 1204 Information Security Policy 1205 University Data Stewardship Policy 1206 Contingency Management for Information-Based Applications Policy 1208 Password Management Policy 1209 Electronic Messaging Also see the FBI National Infrastructure Protection Center’s page on ethics and laws Back to Contents ->