°®°®Ö±²¥

Skip to Main Content

Data Security

Technology Policies

Individual departments are allowed to create and maintain their own policies as they don't overstep boundaries put in place by these policies.

IT Security


This policy defines the basic set of procedures that colleges and departments shall establish and maintain for the management, use, and protection of their microcomputing resources. It establishes guidelines for the administration of computing resources, control of access to data, software installation and maintenance, business resumption, and personnel training.


Policy outlining acceptable use of the University computing resources. This is a general policy that specifies and gives examples of what is considered misuse of resources and the actions that can be taken in case of misuse.


Identity theft is a growing problem throughout the world and °®°®Ö±²¥ must take appropriate steps to limit and protect personal identity information which it collects in its systems. In support of its mission of teaching, research, and public service, °®°®Ö±²¥ has connections to the internet and thereby its systems are exposed to threats from the global community. °®°®Ö±²¥ must take all actions possible to protect the identity information that it maintains in its systems. Personal identity information must be protected from proliferation to systems and media that are not properly secured.


The threat of identity theft has been growing at an unprecedented rate and the °®°®Ö±²¥ commits to provide enhanced security for its students, staff and faculty. Accordingly, the University will no longer use nor permit the use of a Social Security Number (SSN) as the primary identifier for a person in any University information system unless required by law or explicitly approved by the IT Management Council.

IT Operations


Information Technology handles all network/telecom infrastructure for the entire university.


Deans, directors, and department heads are responsible for the maintenance and audit of long distance toll calls. Unauthorized calls must be investigated when the cost is greater than $5.00.


The °®°®Ö±²¥Card is used for identification, verification of °®°®Ö±²¥ status, use of °®°®Ö±²¥ services such as the library services, door access, purchase of parking decals, obtaining passes for °®°®Ö±²¥ sporting and theatrical events, and other related events and services. Certain units within the °®°®Ö±²¥ may require employees to carry an ID badge as an alternate form of identification. This ID badge is used for unit identification for verification of unit status. The ID badge does not replace the °®°®Ö±²¥Card as primary form of identification and shall not be used to grant access to any °®°®Ö±²¥ Service.


Policy created to standardize technology related items purchased for the University.


The purpose of this policy is to articulate the °®°®Ö±²¥’sposition involving the use of mass communications using e-mail (sometimes called “bulk e-mail”), SMS (Short Message Service), MMS (Multimedia Message Service), Instant Messaging, and other electronic means to distribute official messages to members of the °®°®Ö±²¥ community.

IT Governance


Information is an integral part of the business and academic functions of °®°®Ö±²¥; consequently, data is an important institutional resource. In order to make appropriate decisions, Institutional Data must meet basic standards. It also must be accurate and verifiable. The value of the data maintained by the °®°®Ö±²¥ increases through its widespread and consistent use, and it diminishes through misuse, misinterpretation, or unnecessary restrictions on its access.


It is the policy of the °®°®Ö±²¥ that all information utilized in the course of business, research, and education is considered an asset, and as such, administration, faculty, staff, and students are responsible and accountable for its viability and protection. It is a management responsibility to maintain information security and integrity through administration of appropriate legal, audible controls to protect University information from unauthorized, intentional or accidental disclosure, modification, destruction, denial, or misappropriation.


This policy specifies charges for several committees, including the Information Technology Management Council, CIO Council and University Technology Standards Board, and advisory groups Cyber-Infrastructure Council, °®°®Ö±²¥ Classroom Technology Committee, Identity and Access Management Program Functional Committee, Information Security Workgroup, Council on Technologies for Instruction and Research, Student Technology Advisory Council, Research Computing Advisory Committee, Course Management Advisory Group, Student Information Systems Advisory Board, GEMS/FAST Advisory Group