RULE 4,NETWORK SECURITY,REGULATIONS,LIBRARY,THE UNIVERSITY OF UTAH,SKIP,CONTENT,SEARCH,SITE,NAVIGATION,POLICY,SUBJECT,INDEX,CONTACT,YOU ARE HERE,RULES,UNIVERSITY,RULE,PURPOSE,SCOPE,THIS NETWORK,SECURITY,PROTECT,INFORMATION,ASSETS,INFORMATION SYSTEMS,NETWORK,INFRASTRUCTURE,SECTION,INFORMATION SECURITY POLICY,THESE WORDS,PHRASES,CONFIDENTIAL,ASSET,CLASSIFIED,RESTRICTED,SENSITIVE,DATA CLASSIFICATION,ENCRYPTION,ELECTRONIC,ELECTRONIC COMMUNICATION,LIMITED,INTERNET,EMAIL,SOCIAL MEDIA,INFORMATION SYSTEM,APPLICATION,GROUP,SERVERS,ELECTRONIC STORAGE,PROCESSING,TRANSMITTING,DATA,SERVER,WORKSTATION,MOBILE,DEVICE,MEDICAL DEVICE,NETWORKING DEVICE,WEB CAMERA,MONITORING,OWNED,THE UNIVERSITY,USED TO,BUSINESS,OWNERSHIP,CONNECTED,C,MAINTAINING,INFORMATION SERVER,HARDWARE,SOFTWARE,MULTIPLE USERS,USER,PERSON,STUDENTS,STAFF,FACULTY,PERMANENT,EMPLOYEES,CONTRACTORS,VENDORS,RESEARCH,COLLABORATORS,THIRD PARTY,AGENTS,RESOURCES,THREATS,APPLICATIONS,TAKING,CONSIDERATION,OPERATIONAL,RESPONSIBILITY FOR,COMPUTER,OPERATIONS,POSSIBLE,CONFIDENTIALITY,INTEGRITY,CONTROLS,RISK,PASSING,PUBLIC,WIRELESS NETWORKS,RISK ASSESSMENT,RISK MANAGEMENT,THE BUSINESS,REQUIREMENTS,NETWORK AVAILABILITY,SECURITY REQUIREMENTS,REMEDIATION,MUST,ENSURE,CONTROL,IMPLEMENTATION,CONSISTENT,NETWORK SERVICES,FEATURES,SERVICE LEVEL,MANAGEMENT,CONNECTION,PROVISIONING,PRIVATE NETWORK,MANAGED NETWORK,INTRUSION DETECTION,PREVENTION,SYSTEMS,CAPTURED,SEGREGATE,CONSIDER,STRATEGIES,SEGREGATION,DEFINED,PROTECTED,PERIMETER,LOGICAL,DOMAINS,INTERNAL NETWORK,EXTERNAL,PUBLICLY,ACCESSIBLE,NETWORK DEVICE,FUNCTIONALITY,IP SWITCHING,ROUTING,THE NETWORK,DATA VALUE,IMPACT,GATEWAY,INTERCONNECTED,ACCESS,INFORMATION FLOW,FILTER,TRAFFIC,BLOCK,ACCESS NETWORK,CAPABILITY,CONNECT,ACCORDANCE,MINIMUM,FUNCTION,ROLE,NETWORK CONNECTIONS,GATEWAYS,TABLES,NOTE,PARTS,ACADEMIC SENATE,BOARD OF TRUSTEES,ARE TO,FROM TIME TO TIME,DETERMINED,COGNIZANT,OFFICER,INSTITUTIONAL,POLICY COMMITTEE,GUIDELINES,RELATED,MATERIAL,REFERENCES,HEALTH INSURANCE PORTABILITY,ACCOUNTABILITY,HIPAA,PRIVACY,FAMILY EDUCATIONAL RIGHTS,PRIVACY ACT OF 1974,FERPA,20 U S C,FEDERAL INFORMATION SECURITY,ACT OF,FISMA,44 U S C,ISO 27002,INFORMATION TECHNOLOGY,TECHNIQUES,CODE,PRACTICE,INFORMATION SECURITY CONTROLS,NIST,STANDARDS,PAYMENT,ACCEPTANCE,DATA MANAGEMENT,WORLD WIDE WEB,DISCIPLINARY,DISMISSAL,STUDENT RIGHTS,RIGHTS,PUB,DIVISION,XIII,SUBTITLE,HEALTH INFORMATION TECHNOLOGY,ECONOMIC,HEALTH,HITECH ACT,OMNIBUS,RULE 45,MODIFICATIONS,BREACH NOTIFICATION,GENETIC INFORMATION,NONDISCRIMINATION,CONTACTS,DESIGNATED,OFFICIALS,PRIMARY,QUESTIONS,ADVICE,CHIEF INFORMATION SECURITY,CHIEF INFORMATION OFFICER,PRESIDENT,ASSISTANCE,ROLES,AUTHORITY,THE PRESIDENT,FOR EACH,SOMEONE,THE EXECUTIVE,LEVEL,CABINET,OFFICERS,AUTHORIZED,CASES,EXPERT,TOPIC,RESPOND,INTERPRETATION OF,REPORTING,EXECUTIVE,POSITION,ABOVE,ANY OTHER PERSON,WHOM,VICE PRESIDENT,DELEGATED,AREA,THE OWNER,RELEVANT,BEARS,DETERMINING,PARTICULAR,POLICIES,CURRENT,VERSION,REVISION,EFFECTIVE DATE,APRIL 4,MAY 4,MAY 12,BACKGROUND,DATE,VIEW,NUMBER,PREVIOUS,AS OF,WEBSITE,FEEDBACK,WHERE WE ARE,SOUTH,PRESIDENTS CIRCLE,ROOM,LAKE CITY,LINKS,DISCLAIMER,CREDITS,MAIL,FACEBOOK,TWITTER,LAST,