Skip to main content

Drexel University

Drexel University Information Technology

  • Students
  • Faculty
  • Staff
  • Report a Problem
  • Site Home
    • Drexel University
    • Office of the Executive Vice President, Treasurer and COO
    • Business Services
    • Drexel University Information Technology
    • Human Resources
    • Office of Budget and Financial Planning
    • Office of Compliance, Policy and Privacy Services
    • Office of Program Management and Organizational Effectiveness
    • Office of Tax Compliance
    • Office of the Comptroller
    • Procurement Services
    • Public Safety
    • Real Estate and Facilities
  • Get Connected
    • Introduction
    • Computer Accounts Setup
    • Email Setup
    • Wired Network & Internet
    • Wireless Network & Internet
    • Virtual Computer Labs
    • Off-Campus Network Access
    • Streaming TV
    • Phones & Voicemail
  • Services
    • Service Catalog
    • Search the Catalog
    • Workshops & Training
  • Computers & Software
    • Introduction
    • Computer Buying Guide
    • Computer Discounts and Purchases
    • Software at Drexel
    • Computer Operating Systems
    • Acceptable Use Policy
    • Backup and Restore Services
  • Information Security
    • About Information Security
    • News and Announcements
    • Best Practices
    • Data Security Initiative
    • Security Training & Awareness Program
    • Services & Processes
    • Policies and Regulations
    • Helpful Links
    • Frequently Asked Questions
  • Help
    • Support Teams
    • IT Support & Knowledge Base
    • IT Troubleshooting
    • A-Z Documentation
    • Viruses, Phishing & Spam
    • Computer Repairs
    • Current Service Status
    • Report a Problem
  • News & Publications
    • News
    • Publications
    • Technology Update
    • Reports
  • About
    • Organization
    • Initiatives
    • Facilities
    • Policies, Procedures, and Terms of Service
    • Contact Us
  • IT
  • Information Security
  • Policies and Regulations

Policies and Regulations

The purpose of cyber security regulation is to force companies and organizations to protect their systems and information from cyber-attacks such as viruses, trojan horses, phishing, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control system attacks.

Information Security Policies and Regulations:


Copyright and P2P

IT Generative artificial intelligence (AI) Guidance

Federal Laws

Prohibited Companies, Technology, Software, and Services

Cybersecurity Maturity Model Certification (CMMC)

HIPAA Security Program

Pennsylvania Laws

Privacy Policies

Information Security

  • About Information Security
  • News and Announcements
  • Best Practices
  • Data Security Initiative
  • Security Training & Awareness Program
  • Services & Processes
  • Policies and Regulations
    • Copyright and P2P
    • GenAI Guidance
    • Federal Laws
    • Prohibited Companies, Technology, Software, and Services
    • Cybersecurity Maturity Model Certification
    • HIPAA Security Policies
    • PA Laws
    • Privacy
  • Helpful Links
  • Frequently Asked Questions
co-op 100 logo
Drexel University
  • A-Z Index
  • For Media
  • Careers
  • Privacy & Legal
  • Contact
  • Directions & Maps
  • Emergency Information

Follow IT:

  • Twitter

Drexel University, 3141 Chestnut Street, Philadelphia, PA 19104, 215.895.2000, © All Rights Reserved