The following standards apply to all uses of University information technology resources. These standards are not an exhaustive list of acceptable use, but are intended to illustrate what unlawful or ...
The use of information systems while conducting University business bears inherent risks that may lead to breaches of confidentiality, exploitation of vulnerabilities, or other abuse of University ...
Please refer to the University of Colorado’s Administrative Policy Statement (APS) 6005 IT Security Program and System-wide Baseline Security Standards which apply to all individuals who access or ...