About CSU Policy


CSU Accessible Procurement Process

It is the policy of the CSU to make information technology resources and services accessible to all students, faculty, staff, and the general public regardless of disability. 

The CSU Accessible Technology Initiative (ATI) was established to target the elimination of accessibility barriers, with a focus on web-based resources and materials, instructional materials, and procurement. This procurement process was developed to align with Coded MemorandumOpens in new window , along with the goals and success indicators articulated in the coded memorandum and reported to the CSU in campus-prepared Annual Reports.

The ATI goals and success indicators are based on applicable federal and state laws and standardsOpens in new window , including, but not limited to, Sections 504 and 508 of the Rehabilitation Act of 1973; the Americans with Disabilities Act (ADA); California Government Code 11135; the U.S. Access Board's Section 508 Standards; and the World Wide Web Consortium's Web Content Accessibility Guidelines (WCAG). Increasingly, universities across the country are facing legal challenges based on user complaints about inaccessible websites, instructional materials, and/or products or services. SettlementsOpens in new window have resulted in those universities having to undertake a major initiative (like ATI), often at high cost and in a shortened time line, to reach compliance.

CSU Information Security Policy

The CSU Information Security policy provides direction for managing and protecting the confidentiality, integrity and availability of CSU information assets.

The Board of Trustees of the California State University (CSU) is responsible for protecting the confidentiality, integrity and availability of CSU information assets. Unauthorized modification, deletion, or disclosure of information assets can compromise the mission of the CSU, violate individual privacy rights, and possibly constitute a criminal act.

It is the collective responsibility of all users to ensure:

  • Confidentiality of information which the CSU must protect from unauthorized access.
  • Integrity and availability of information stored on or processed by CSU information systems.
  • Compliance with applicable laws, regulations, and CSU/campus policies governing information security and privacy protection.