About CSU Policy
CSU Accessible Procurement Process
It is the policy of the CSU to make information technology resources and services accessible to all students, faculty, staff, and the general public regardless of disability.
The CSU Accessible Technology Initiative (ATI) was established to target the elimination of accessibility barriers, with a focus on web-based resources and materials, instructional materials, and procurement. This procurement process was developed to align with Coded Memorandum, along with the goals and success indicators articulated in the coded memorandum and reported to the CSU in campus-prepared Annual Reports.
The ATI goals and success indicators are based on applicable federal and state laws and standards, including, but not limited to, Sections 504 and 508 of the Rehabilitation Act of 1973; the Americans with Disabilities Act (ADA); California Government Code 11135; the U.S. Access Board's Section 508 Standards; and the World Wide Web Consortium's Web Content Accessibility Guidelines (WCAG). Increasingly, universities across the country are facing legal challenges based on user complaints about inaccessible websites, instructional materials, and/or products or services. Settlements have resulted in those universities having to undertake a major initiative (like ATI), often at high cost and in a shortened time line, to reach compliance.
CSU Information Security Policy
The CSU Information Security policy provides direction for managing and protecting the confidentiality, integrity and availability of CSU information assets.
The Board of Trustees of the California State University (CSU) is responsible for protecting the confidentiality, integrity and availability of CSU information assets. Unauthorized modification, deletion, or disclosure of information assets can compromise the mission of the CSU, violate individual privacy rights, and possibly constitute a criminal act.
It is the collective responsibility of all users to ensure:
- Confidentiality of information which the CSU must protect from unauthorized access.
- Integrity and availability of information stored on or processed by CSU information systems.
- Compliance with applicable laws, regulations, and CSU/campus policies governing information security and privacy protection.