Otis College of Art and Design logo
  • Join us for the ultimate genre mash up as we drop the best hip hop and underground hiphop from all over as well as some of the freshest hard hitting electronic music out today. Presented by DJ Chewby (Pamela Torzan), DJ Snowden (Ryan Snowden) Daybid 1X (David Namkoong), and 90’s Kid (Danial Siddiqui) of the Otis Radio class.


  • Come enjoy the awesomeness of Soundtracks from Games, Movies and TV Shows with DJ Tea Time (Joshua Timmons), DJ SurgeMiester (Sergio Betancourt ) and DJ ForGrapeJelly (Steven Escarcega).


  • Fine Arts presents a lecture by painter Mary Weatherford. She received her BA from Princeton and MFA from Bard. Weatherford has shown at David Kordansky Gallery in L.A., LAxART in L.A., Brennan & Griffin in New York, and Debs & Co in New York.  In addition, her work is included in collections of MoMA, LACMA, Hammer Museum, Museum of Contemporary Art in San Diego, and OCMA.
    All are welcome
    Series organized by Photography Director Soo Kim
  • “Foregrounds” is a show exploring how we listen to sounds. It utilizes field recordings by blending songs and spoken word pieces with the soundscapes in which we listen to them – whether it be played along with Los Angeles traffic, the sound of a meal being prepared, or waves at the beach. Presented by DJ Derek (Corn), DJ Nasera (Alayon), DJ Max (Miles) of the Otis Radio class.


  • HOT & HE∆VY

    Apr 28| Special Event


  • Tour I: Artists Studios

    May 03| Continuing Education

    Fee: $75
    In conjunction with Freeway Studies #2: Inside the Quad

    Curators Meg Linton and Jeseca Dawson lead a tour of artists studios located "inside the quad." Tour includes transportation, lunch, and snacks.

  • student runway show

    May 03| Special Event

    The annual Scholarship Benefit and Fashion Show at the Beverly Hilton Hotel is L.A.'s largest runway show. Featuring student designs created with mentors during the 2013-14 year, the show raises $1 million for student scholarships. Awardees this year include Leon Max, Michael Egeck, and Isabel and Ruben Toledo.


Policies & Forms



Is it a Policy, a Standard / Procedure or a Guideline?

What's in a name? We frequently hear people use the names "policy", "standard", “procedure”, and "guideline" to refer to documents that fall within the policy infrastructure. So that those who participate in this consensus process can communicate effectively, we'll use the following definitions.

Policy: A policy is typically a document that outlines specific requirements or rules that must be met. In the information/network realm, policies are usually point-specific, covering a single area. For example, an "Acceptable Use" policy would cover the rules and regulations for appropriate use of the computing facilities.

Standard Procedure: A standard procedure is typically collections of system-specific or procedural-specific requirements that must be met by everyone. For example, you might have a standard that describes how to harden a Windows XP workstation for placement on an external (DMZ) network. People must follow this standard exactly if they wish to install a Windows XP workstation on an external network segment.

Guideline: A guideline is typically a collection of system specific or procedural specific "suggestions" for best practice. They are not requirements to be met, but are strongly recommended. Effective security policies make frequent references to standards and guidelines that exist within an organization.

Policy - Acquisition and Use of Domain Names
Policy - Appropriate Use Policy
Policy - Backup Recovery of User Files
Policy - Banner Data Acceptable Use
Policy - Complying with the Digital Millennium Copyright Act
Policy - Change Management
Policy - E-Mail Signature Block Standard
Policy - Helpdesk Support While Traveling
Policy - Laptop Encryption
Policy - Off Campus Access via Virtual Private Network
Policy - Otis Community E-Mail Responsibility
Policy - Passwords rev 2
Policy - Proper E-Mail Use
Policy - Purchasing Computers, Printers, Software
Policy - Remote Access
Policy - Response to a Student Violation of the DMCA
Policy - Support of Home Computer Equipment
Policy - Wireless Communication on Internal Wireless Network
Policy - Work Order
Policy - Office Moves
Policy - Restoring Corrupted Operating System
Policy - Standard Workstation Screen-Saver Operation
Policy - Vendor Access
Policy - Changing Password by IS Department
Policy - Data Entry Standards for Banner Users
Policy - Information Security
Policy - Student E-Mail Account Retention
Policy - Banner Common Matching
Policy - Granting Banner Accounts
Policy - Duplicate PIDM Clean Up
Policy - Risk Assessment
Policy - Student Access to Administrative Information Systems (v2)
Policy - Student E-Mail Responsibility (v2)
Policy - Submitting High Importance E-Mails to Otis College
Policy - Submitting Mass E-Mails to Otis College (v3)
Policy - TrackIT Work Order Retention

Procedure - Proposing Auxiliary Domain Names
Procedure - Banner Common Matching