Chapter 300 Information Technology
301. Acceptable Use of Information Resources
302. Business Continuity and Disaster Recovery
303. Computer Technology Purchases and Allocations
305. End User Information Security
306. Identity Theft Compliance (Red Flag Rules)
307. Information Security Related to University Personnel
308. Information Systems Access Control
309. Information Systems Acquisition, Development, and Maintenance
310. Information Systems Operations Security
311. Mobile Telephones
312. Network Management Security
313. Unauthorized Distribution of Copyrighted Work (Copyright Infringement)