Outsourcing Policy

School of Visual Arts is hereinafter referred to as “the company.” 1.0 Overview Outsourcing is a logical practice when specialized expertise is required, which happens frequently in the field of … more

Download

Network Security Policy

School of Visual Arts is hereinafter referred to as “the company.” 1.0 Overview The company wishes to provide a secure network infrastructure in order to protect the integrity of corporate … more

Download

Network Access and Authentication Policy

School of Visual Arts is hereinafter referred to as “the company.” 1.0 Overview Consistent standards for network access and authentication are critical to the company’s information security and are often … more

Download

Incident Response Policy

School of Visual Arts is hereinafter referred to as “the company.” 1.0 Overview A security incident can come in many forms: a malicious attacker gaining access to the network, a … more

Download

Data Classification Policy

School of Visual Arts is hereinafter referred to as “the company.” 1.0 Overview Information assets are assets to the company just like physical property.  In order to determine the value … more

Download

Confidential Data Policy

School of Visual Arts is hereinafter referred to as “the company.” 1.0 Overview Confidential data is typically the data that holds the most value to a company.  Often, confidential data … more

Download

Acceptable Use Policy

School of Visual Arts is hereinafter referred to as “the company.” Acceptable Use Policy.  The following terms constitute our “Acceptable Use Policy”: You agree not to use the Services to … more

Download

Terms of Service

Terms of Service Version 1.0 Last revised on:  September 23, 2024 Welcome to the School of Visual Arts!  Before using our website (www.sva.edu), software, products, mobile application(s), and services (together, … more

Download

Privacy Policy

Privacy Policy We at The School of Visual Arts (“SVA”, “we”, or “us”) have created this Privacy Policy to describe our practices regarding information we collect through our websites, including … more

Download
Page: 2 of 2