Information Security Guidelines

Information is a critical asset of Bryant University and protecting information assets and their related processing systems is the primary goal of Bryant University’s Information Security Program. All information created or used in support of Bryant University business is considered university information. University information will be protected from accidental, malicious or unauthorized disclosure, misuse, modification, destruction, loss and/or damage.

Guidelines
Under Review
Service Provider Forms

Applications and services contracted for by the University and hosted externally by service providers bring special security challenges. The following information is provided to ensure compliance with all applicable state and federal laws and regulations, University policies, and to assist the Bryant community in sharing information properly with third parties. Vendors that are receiving and/or storing sensitive information must be properly vetted to ensure they meet or exceed the University’s standards for the protection of sensitive information.

Information Technology Guidelines & Controls

It is the responsibility of each Information Services department to develop and document operational practices (process and procedure) in order to implement the goals of the University's adopted security standards. Refer to Standards.


To ensure practices and guidelines remain current, they undergo regular review. Guidelines are approved by the Information Security Program Committee. Suggestions, questions and concerns are welcome, and should be addressed to infosec@bryant.edu.