Security Planning Policy and Procedures (PL-1)
The university develops, disseminates, and periodically reviews/updates formal, documented procedures to facilitate the implementation of the Security Planning policy and associated Security Planning controls.
System Security Plan (PL-2)
The university (Chief Information Security Officer) develops and implements a security plan that provides an overview of the security requirements and a description of the security controls in place or planned for meeting those requirements.
Rules of Behavior (PL-4)
The university defines scope, behavior, practices and compliance pertaining to use of information resources.