These are policies related to the use of computers owned by Penn State and computers connected to any Penn State network. Please read, understand, and adhere to these policies.
Note: If you are viewing this site from a non-Penn State network, these linked pages may not be available to you.
- AD08 – Procedures for the purchase of display advertising
- AD11 – University policy on confidentiality of student records (FERPA)
- AD20 – Computer and network security
- AD23 – Use of institutional data
- AD27 – Commercial sales activities at university locations
- AD53 – Privacy statement
- AD54 – Web page design and image
- AD56 – Use of group email to communicate business
- AD71 – Data Categorization
- ADG01 – Glossary of computerized data and system terminology
- ADG02 – Computer Facility Security
- FN14 – Use of University tangible assets, equipment, supplies and services
- Copyright – Copyright information
- Digital Media – Ethical and legal use
- HIPAA – Security of health-related electronic data transfers
- Licensing – Understand Penn State federal registration and the use of the University’s indicia, consisting of various names, Trademarks, and symbols
- Password Policy – This policy applies to every person using computers and accounts controlled by ITS
- University Policy Manual – Policies and Guidelines that make up the “University Policy Manual” also known as GURU
- Office of Student Conduct – For issues referred to the Office of Student Conduct (OJA) for further action. Staff in OJA will contact you to arrange an appointment and will meet with you to determine whether you violated the University Code of Conduct. If so, a sanction will be assigned for the specific violation.
- Office of Human Resources (OHR) – For issues referred to the Office of Human Resources (OHR) for further action, staff in OHR will contact your Human Resources Representative to arrange for your supervisor to discuss any alleged violation.
The Office of Information Security does not play a role in the faculty, staff, or student disciplinary process or in determining sanctions should a violation be found. However, we can answer any technical questions you may have.