IT Services Standard Faculty Service Access

Size: px
Start display at page:

Download "IT Services Standard Faculty Service Access"

Transcription

1 IT Services Revision History IT Services Standard Faculty Service Access Revision and Review Version Version Date Status Summary of Changes Author 0.1 Oct 8, 2013 Draft Initial Draft Kevin Vadnais 0.2 Nov 7, 2013 Draft Modifications as suggested by ITS leaders, as well as changes to include the retention of academic staff data until a more formal project can decide on permanent action. 1.0 Nov 18, 2103 Final Added Appendix A and made final formatting changes 1.1 Nov 29, 2013 Update Changed some aspects of the Library Services Kevin Vadnais, Project Team, ITS Leaders Kevin Vadnais Leona Jacobs Document Reviews Reviewer Name and Title Date Darren Schell, Manager, Transformation Solutions Nov 7, 2013 IT Services Standard Page 1 of 4

2 Authority & Alignment Authority UNIVERSITY OF LETHBRIDGE INFORMATION AND TECHNOLOGY MANAGEMENT POLICY Subsection 4 Privacy, Information Security, and Identity Management Subsection 5 Information Management Alignment Provincial Post-Secondary System ITM Strategic Direction Priority High Quality Teaching and Learning Environment Overview This standard specifies the terms and conditions of granting and revoking access to University Services for faculty members. Scope This Standard applies to all accounts held by academic staff defined as individuals appointed as academic staff by the University of Lethbridge Board of Governors. This includes both full time and part time positions as well as sessional instructors. This document applies only to the process of granting and revoking access to and data services, and does not cover any aspect of or data storage/retention. Compliance & Exceptions Exceptions to this standard must follow the exception process defined below. Failure to comply with this standard may result in disciplinary action. Disciplinary actions shall follow established University policies and procedures and shall be in accordance with the applicable Faculty Handbook, Sessional Lecturers Handbook, collective agreement and employee manuals. Standard Requirements Access to University services for academic staff members happens automatically upon the successfully processing of a Payroll Authorization Form (PAF) in the Banner ERP system. These services include the following: 1. a business account 2. Wireless Access to the UofL wireless network on campus IT Services Standard Page 2 of 4

3 3. VPN Access to the Virtual Private Network software for connecting to campus network resources from off-campus. 4. A backed up storage space for working files. This storage space is backed up and accessible from any computer logged into on campus. 5. Library services 6. Other various security groups as required for administrative purposes and access to network shared storage spaces. Some services not specified by this standard may require additional forms to be filled out, but these requests will be dealt with on a case-by-case basis. These services will remain in place throughout the academic staff member s career at the University. When the academic staff member terminates employment with the University, actions are taken to remove access to these services. The revocation of each service is as follows: 1. VPN, Security Groups and Wireless Access to these services is removed on the effective date of termination. 2. Access to their business will be removed immediately after the effective date of termination passes. If business needs require it, services can be accessed again through the exception process outlined below. For a short amount of time, an automated message will be created to inform senders that the account is no longer active and they should direct their correspondence to a different source. a. For those Academic staff who are retiring from the University in good standing, provisions will be made to retain their services as recognition of service. b. The contents of an Academic staff member s will not be deleted after termination of employment with the University. His/her mailbox will be archived and stored for data retention purposes 3. File Services Access to the content on the file storage space will be removed immediately after the effective date of termination passes and can be granted back using the exception process outlined below. a. Academic staff member file and web content located on University storage will not be deleted after termination of employment with the University. 4. Library Services continued access to library services will be determined by the Library s Access Policy (to information resources and as approved by the University s General Faculties Council). 5. Section 2.b and 3.a will only be carried out until a project has been completed that addresses academic and research data retention issues. These sections are IT Services Standard Page 3 of 4

4 not intended to be a permanent operational activity and will be removed once the retention project has concluded. Exception Process Any exceptions to this policy must be approved in writing by the chair of the academic staff member s department, the Dean or Librarian of the respective Faculty/Department/School, and the Provost, subject to the Faculty Handbook and Sessional Lecturers Handbook. Each request will then be processed by the Information Security Office. The exception request form must include the following information: 1. The account holder information (name, username, contact method) 2. The details of the exception (what service is being altered, why the exception is required) 3. The dates for the duration of the exception (start date, end date) 4. Authorizing signature of the Chair, Dean, and Provost. Related Content Type Policy Title Information and Technology Management Policy Data Classification The information in this document is classified as: Public. Measurement Active access for academic staff members should not be discovered during annual audits after their terminations have been processed, with the exception of retiree s services. 100% of all exceptions will have associated forms available for auditing purposes upon request Contact Kevin Vadnais Manager, Information Security Office IT Services Standard Page 4 of 4

5 Authorization & Signature Mark Humphries, CIO Date IT Services Standard Page 5 of 4

6 Appendix A Exception Guidelines There are some circumstances where individuals may be members of multiple user groups. This may lead to confusion about which set of standards should apply in a given situation. This appendix is meant to offer some suggestions where a clear exception case is not evident. As new situations arise that require clarity, this section will be updated appropriately. 1. A continuing employee or academic staff member who is also registered as a student is terminated. In this situation, it would be advisable to do the following: a. Treat the termination as an employee/academic staff termination and remove access to the address and staff file services immediately. b. Rename the account to a new address for the individual and modify affected class/student mailing lists to ensure continued receipt of student related materials. This prevents future business correspondence from arriving in the students account. 2. A continuing employee or academic staff member who also has alumni status is terminated. In this situation, it would be advisable to do the following: a. Treat the termination as an employee/academic staff termination and remove access to and staff file services immediately. b. If not previously done, create a new alumni address for the individual (@alumni.uleth.ca). This prevents future business correspondence from arriving in the individual s account. A message indicating the new alumni status and address may be added to the terminated employee account to help redirect personal communications. IT Services Standard Page 6 of 4

IT Services. IT Services Standard. Data Storage Security

IT Services. IT Services Standard. Data Storage Security IT Services IT Services Standard Data Storage Security Revision and Review Revision History Version Version Date Status Summary of Changes Author 0.1 Mar 24, 2015 Draft Initial draft Kevin Vadnais 0.2

More information

QUALITY ASSURANCE HANDBOOK. Policies, procedures and resources to guide undergraduate and graduate program development and improvement at UOIT

QUALITY ASSURANCE HANDBOOK. Policies, procedures and resources to guide undergraduate and graduate program development and improvement at UOIT QUALITY ASSURANCE HANDBOOK Policies, procedures and resources to guide undergraduate and graduate program development and improvement at UOIT UOIT Academic Council June 15, 2010, revised June 9, 2011 QUALITY

More information

Minnesota State Colleges and Universities System Guideline Chapter 5 Administration

Minnesota State Colleges and Universities System Guideline Chapter 5 Administration Minnesota State Colleges and Universities System Guideline Chapter 5 Administration Appropriate Use and Implementation of Electronic Part 1. Purpose. To establish requirements and responsibilities for

More information

Email policy and practice

Email policy and practice Email policy and practice This policy applies to all staff (including agency workers, casual and temporary staff), visitors, contractors, students, alumni and researchers of Anglia Ruskin University, and

More information

Policy # 5.58 SOUTHERN UTAH UNIVERSITY Date Approved: 01/13/12

Policy # 5.58 SOUTHERN UTAH UNIVERSITY Date Approved: 01/13/12 Page 1 of 6 I. PURPOSE Electronic mail (e-mail) has become an essential service greatly enhancing communication both within the Southern Utah University community and to external users, including prospective

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

Information Technology Control Procedures For Eligibility to Access University Banner Information System

Information Technology Control Procedures For Eligibility to Access University Banner Information System Scope: This document establishes IT Control requirements for requesting access to the University s ERP Banner System as well as the responsibilities of stewardship to protect University information. I.

More information

Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy

Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with

More information

Governance Processes and Organizational Structures for Information Management

Governance Processes and Organizational Structures for Information Management UNIVERSITY BUSINESS EXECUTIVE ROUNDTABLE Governance Processes and Organizational Structures for Information Management Custom Research Brief Research Associate Lauren Edmonds Research Manager Priya Kumar

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

Tuition Assistance Degree Completion

Tuition Assistance Degree Completion HR 04 Tuition Assistance Degree Completion Classification: Responsible Authority: Executive Sponsor: Approval Authority: Human Resources First Approved: 2010-10-27 Last Reviewed: 2011-02-02 Mandatory Review

More information

ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY

ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY PURPOSE The value of data as an institutional resource is increased through its widespread and appropriate use; its value is diminished through misuse,

More information

Effective Date: Oct. 27, 2009... 1

Effective Date: Oct. 27, 2009... 1 Policy Title: Office of Information Technology Email Usage and Retention Policy Policy No.: 7010 Rev.: 0 Effective Date: Oct. 27, 2009 Last Revision: Oct. 27, 2009 Responsible Office: Responsible Official:

More information

Institutional Handbook of Operating Procedures (IHOP)

Institutional Handbook of Operating Procedures (IHOP) Institutional Handbook of Operating Procedures (IHOP) Section: Section 12 Academic Education and Student Related First Release Date: Policy Name: 12.2 Credentials for Faculty in Degree Programs Offered

More information

IT Investment and Business Process Performance: Survey Questionnaire

IT Investment and Business Process Performance: Survey Questionnaire IT Investment and Business Process Performance: Survey Questionnaire Thank you for participating in the study being conducted by the EDUCAUSE Center for Applied Research (ECAR). This survey is a critical

More information

HAVERFORD COLLEGE IITS: POLICY AND PLANNING

HAVERFORD COLLEGE IITS: POLICY AND PLANNING Contents: 1. Preface 2. Policy 3. Audit and Compliance Section 1. Preface A. Name. The formal name of this policy is the Policy. B. Status of This Policy 1. Draft. Completed 4/11/2013 2. Public Review

More information

Rowan University Data Governance Policy

Rowan University Data Governance Policy Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data

More information

IV. Conditions of Academic Appointment

IV. Conditions of Academic Appointment IV. Conditions of Academic Appointment A. Locus of Authority IIT is a private university. The ultimate authority to determine policy and conditions of academic appointment resides with the Board of Trustees

More information

2011 Outcomes Assessment Accreditation Handbook

2011 Outcomes Assessment Accreditation Handbook 2011 Outcomes Assessment Accreditation Handbook Associate Degree Programs Baccalaureate Degree Programs Master Degree Programs Accreditation Policies can be found in a separate document on the ATMAE website

More information

CURRICULUM MODIFICATIONS: GRADUATE AND UNDERGRADUATE PROGRAMS

CURRICULUM MODIFICATIONS: GRADUATE AND UNDERGRADUATE PROGRAMS RYERSON UNIVERSITY POLICY OF SENATE CURRICULUM MODIFICATIONS: GRADUATE AND UNDERGRADUATE PROGRAMS Policy Number: 127 Approval Date: November 4, 2014 Previous Approval Dates: May 3, 2011 Policy Review Date

More information

Solution Brief. Archiving from Office 365 for Compliance and ediscovery. 1) Capture Everything

Solution Brief. Archiving from Office 365 for Compliance and ediscovery. 1) Capture Everything Solution Brief Archiving from Office 365 for Compliance and ediscovery Barracuda Message Archiver enhances Office 365 with the additional functionality needed to support sound information governance practices.

More information

International Partnerships

International Partnerships Office of International Programs Guidelines for Establishing International Partnerships What is an international cooperative partnership? An international cooperative partnership is a reciprocal relationship

More information

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for

More information

Job Aid Notice Of Voluntary Separation Workflow

Job Aid Notice Of Voluntary Separation Workflow Title Job Aid Notice Of Voluntary Separation Workflow Date March 2009 Written by Julie Kennedy, IS Technical Training Copyright Kent State University and Sungard Higher Education, 2009 Process Owner Human

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Advisor mywku Tabs and Pages

Advisor mywku Tabs and Pages Advisor mywku Tabs and Pages mywku will use tabs and pages to separate and classify information. Everyone will have a mywku tab which has a Campus Info page that everyone sees and then will have personal

More information

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY - 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

INSTITUTIONAL QUALITY ASSURANCE POLICY

INSTITUTIONAL QUALITY ASSURANCE POLICY INSTITUTIONAL QUALITY ASSURANCE POLICY Approval: Responsibility: Contact Office: University Senate; Ontario Universities Council on Quality Assurance (Quality Council) Provost and Vice President Academic

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

MUNICIPALITY of COLCHESTER PURCHASING CARD POLICY. January 2006

MUNICIPALITY of COLCHESTER PURCHASING CARD POLICY. January 2006 MUNICIPALITY of COLCHESTER PURCHASING CARD POLICY January 2006 Purpose: Purchasing card programs are designed to provide an efficient and lowcost method of purchasing and paying for small dollar and high

More information

Norwich University Information Assurance Security Policy. Final Version 10.0 for Implementation

Norwich University Information Assurance Security Policy. Final Version 10.0 for Implementation Norwich University Information Assurance Security Policy Final Version 10.0 for Implementation Table of Contents Norwich University... 0 Information Assurance Security Policy... 0 1.0 Introduction... 2

More information

Access Control Policy

Access Control Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN. Email Management and Data Storage Policy. Version 1.4

PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN. Email Management and Data Storage Policy. Version 1.4 PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN Email Management and Data Storage Policy Version 1.4 Document Control Title: Reference: Original Author(s): Owner: Distribution: Reviewed by: Quality Assured

More information

Policies and Procedures

Policies and Procedures Policies and Procedures STUDENTS REVOKING DEGREES In Fall 2010, GFC Executive directed the Associate Vice President/Registrar to develop a policy which would govern the revocation of degrees granted by

More information

Records Retention Procedure

Records Retention Procedure Records Retention Procedure 1. Purpose The purpose of this procedure is to ensure all necessary records and documents are adequately provided, maintained, and comply with record retention requirements

More information

RECORDS AND INFORMATION MANAGEMENT AND RETENTION

RECORDS AND INFORMATION MANAGEMENT AND RETENTION RECORDS AND INFORMATION MANAGEMENT AND RETENTION Policy The Health Science Center recognizes the need for orderly management and retrieval of all official records and a documented records retention and

More information

AUBnet (email) Accounts Policies

AUBnet (email) Accounts Policies (email) s Policies Reference: CNS-P-Acct Revision: B Supersedes: Purpose: Source: CNS-P-EMAIL-A This policy and related policies provide the framework in which all accounts and email and intranet are provided

More information

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose

More information

Records Management Manual of the University of Nevada Las Vegas Table of Contents

Records Management Manual of the University of Nevada Las Vegas Table of Contents Records Management Manual of the University of Nevada Las Vegas Table of Contents Part 1: Overview of Records Management at the University of Nevada Las Vegas... 2 1.1 PROGRAM RATIONALE, RESPONSIBILITIES

More information

Cal Poly Information Security Program

Cal Poly Information Security Program Policy History Date October 5, 2012 October 5, 2010 October 19, 2004 July 8, 2004 May 11, 2004 January May 2004 December 8, 2003 Action Modified Separation or Change of Employment section to address data

More information

How To Protect Data At Northeast Alabama Community College

How To Protect Data At Northeast Alabama Community College Information Systems Security Policy Northeast Alabama Community College Center for Information Assurance Northeast Alabama Community College 138 AL Hwy 35, Rainsville, AL 35986 (256) 228-6001 1 5/22/2014

More information

GUIDELINES FOR ACADEMIC PROGRAM REVIEW For self-studies due to the Office of the Provost on October 1, 2015 GRADUATE PROGRAMS

GUIDELINES FOR ACADEMIC PROGRAM REVIEW For self-studies due to the Office of the Provost on October 1, 2015 GRADUATE PROGRAMS GUIDELINES FOR ACADEMIC PROGRAM REVIEW For self-studies due to the Office of the Provost on October 1, 2015 GRADUATE PROGRAMS OVERVIEW OF PROGRAM REVIEW At Illinois State University, primary responsibility

More information

APPOINTMENT TO AND PROMOTION OF ACADEMIC STAFF

APPOINTMENT TO AND PROMOTION OF ACADEMIC STAFF This policy applies to Faculty only. Appointment Types APPOINTMENT TO AND PROMOTION OF ACADEMIC STAFF In policies, practices, and procedures related to faculty appointments, the University shall not engage

More information

Identity and Access Management Policy

Identity and Access Management Policy Page 1 of 5 Identity and Access Management Policy Reference number 0605-IAM Interim HEMIS Classification 0605 Purpose Date of implementation 1 December 2012 Review date Previous reviews Policy owner Policy

More information

Information Management and Protection Policy

Information Management and Protection Policy Document Title: Information Management and Protection Policy Document Type: Policy No. Of Pages (11) Scope: Government of Newfoundland and Labrador and Public Bodies supported by the Office of the Chief

More information

Information Technology Services

Information Technology Services Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

The Belk College of Business Policy Statement on Academic and Professional Qualifications

The Belk College of Business Policy Statement on Academic and Professional Qualifications The Belk College of Business Policy Statement on Academic and Professional Qualifications The Belk College of Business is committed to maintaining a faculty of high quality that is consistent with its

More information

FAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY

FAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY FAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY Authority: Category: Applies to: Chancellor, Fayetteville State University University-wide Faculty, Staff, and Students History: Approved on

More information

Software Engineering Methodology. Appendix F Computer System Retirement Guidelines

Software Engineering Methodology. Appendix F Computer System Retirement Guidelines Software Engineering Methodology Appendix F Computer System Retirement Guidelines Overview Purpose: This procedure establishes the process for the orderly retirement of information systems regardless of

More information

ACADEMIC APPOINTMENTS GUIDELINES

ACADEMIC APPOINTMENTS GUIDELINES OREGON STATE UNIVERSITY ACADEMIC APPOINTMENTS GUIDELINES May 2013 Published by Office of Academic Affairs Office of Human Resources Date Posted: 08/06/15 TABLE OF CONTENTS Section Page I. OSU Policies

More information

Academic Personnel Office Records Retention Schedule. Retain ten years past separation/retirement, then shred. Shred upon death.

Academic Personnel Office Records Retention Schedule. Retain ten years past separation/retirement, then shred. Shred upon death. 1 Academic Personnel Office Records Retention Schedule Record Title Description Disposition Ladder Rank & Lecturer PSOE/SOE academic personnel review files including academic dean/provost administrative

More information

Discovery Technology Group

Discovery Technology Group Discovery Technology Group E-mail Retention: Readiness Survey E-mail now represents the largest source of new documents and records generated within a company, and the most troublesome from a retention

More information

Approved by: Vice President, Human Resources & Corporate Resources and Vice President, Treasury & Compliance Date: October 14, 2009

Approved by: Vice President, Human Resources & Corporate Resources and Vice President, Treasury & Compliance Date: October 14, 2009 RECORDS AND INFORMATION Approved by: Vice President, Human Resources & Corporate Resources and Vice President, Treasury & Compliance Date: October 14, 2009 PURPOSE Penn West recognizes that responsible

More information

Standard Operating Procedure. Authority to access and monitor University IT Account holder communications and data

Standard Operating Procedure. Authority to access and monitor University IT Account holder communications and data Standard Operating Procedure Title: Authority to access and monitor University IT Account holder communications and data Version: 2.0 Effective Date March 2016 Summary Describes the approval process and

More information

ITS Policy Library. 11.08 - Use of Email. Information Technologies & Services

ITS Policy Library. 11.08 - Use of Email. Information Technologies & Services ITS Policy Library Information Technologies & Services Responsible Executive: Chief Information Officer, WCMC Original Issued: December 15, 2010 Last Updated: September 18, 2015 POLICY STATEMENT... 3 REASON

More information

Standard Operating Procedures for Blackboard Policy

Standard Operating Procedures for Blackboard Policy Services Standard Operating Procedures for Blackboard Policy Table of Contents 01 Policy Statement... 2 02 Information Services (ITS) and the... 2 03 Blackboard and the Banner Student Information System...

More information

Tuition and Fees 2014-2015. Academic and Registration Info

Tuition and Fees 2014-2015. Academic and Registration Info Tuition and Fees 2014-2015 Academic and Registration Info North Idaho College 31 2014-2015 REGISTRATION Registration is the official process of enrolling in classes. NIC is on a 16-week Fall/Spring Semester,

More information

HOW GRANT THOU ART? Grant Administration Process

HOW GRANT THOU ART? Grant Administration Process HOW GRANT THOU ART? Pre Application Authorization Post Administration More Grants, Grant $s and Awareness Grant Administration Process Owens Community College Summer 2007 GRANTS ADMINISTRATION PROCESS

More information

College of Education Computer Network Security Policy

College of Education Computer Network Security Policy Introduction The College of Education Network Security Policy provides the operational detail required for the successful implementation of a safe and efficient computer network environment for the College

More information

Payment Card Industry (PCI) Policy Manual. Network and Computer Services

Payment Card Industry (PCI) Policy Manual. Network and Computer Services Payment Card Industry (PCI) Policy Manual Network and Computer Services Forward This policy manual outlines acceptable use Black Hills State University (BHSU) or University herein, Information Technology

More information

POLICIES AND REGULATIONS Policy #78

POLICIES AND REGULATIONS Policy #78 Peel District School Board POLICIES AND REGULATIONS Policy #78 DIGITAL CITIZENSHIP Digital Citizenship Digital citizenship is defined as the norms of responsible behaviour related to the appropriate use

More information

Information Security Program

Information Security Program Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security

More information

BCSD WebMail Documentation

BCSD WebMail Documentation BCSD WebMail Documentation Outlook Web Access is available to all BCSD account holders! Outlook Web Access provides Webbased access to your e-mail, your calendar, your contacts, and the global address

More information

The University of Toledo Academic Affairs Committee Meeting Higher Learning Commission and Strategic Planning

The University of Toledo Academic Affairs Committee Meeting Higher Learning Commission and Strategic Planning The University of Toledo Academic Affairs Committee Meeting Higher Learning Commission and Strategic Planning David Cutri May 11, 2015 Higher Learning Commission Academic accrediting body for the University

More information

Academic and Administrative Space Policy

Academic and Administrative Space Policy University of California, Merced Academic and Administrative Space Policy Responsible Official: Provost/Executive Vice Chancellor Responsible Office: Real Estate Services Group, Division of Planning and

More information

University of Illinois at Urbana-Champaign Voluntary Retirement Program. For Retirement-Eligible Tenured Faculty and Other Academic Staff

University of Illinois at Urbana-Champaign Voluntary Retirement Program. For Retirement-Eligible Tenured Faculty and Other Academic Staff University of Illinois at Urbana-Champaign Voluntary Retirement Program For Retirement-Eligible Tenured Faculty and Other Academic Staff February 3, 2010 TABLE OF CONTENTS INTRODUCTION...1 PROGRAM DESCRIPTION...1

More information

ADMINISTRATIVE PROCEDURE Staff Salary Administration

ADMINISTRATIVE PROCEDURE Staff Salary Administration ADMINISTRATIVE PROCEDURE Staff Related Policy: 1.6.2 (Staff) These procedures have been established to implement UNT Policy 1.6.2, (Staff). These procedures apply to staff positions categorized as regular

More information

The University of Research and Development Centers

The University of Research and Development Centers Centers & Institutes Description Centers and institutes are established within the University to strengthen and enrich programs of research, instruction or public service conducted by the faculty and staff.

More information

Wright State University Information Security

Wright State University Information Security Wright State University Information Security Controls Policy Title: Category: Audience: Reason for Revision: Information Security Framework Information Technology WSU Faculty and Staff N/A Created / Modified

More information

PIEDMONT VIRGINIA COMMUNITY COLLEGE VIII HUMAN RESOURCES / PERSONNEL POLICIES VIII 13.0 EMPLOYEE SEPARATION POLICY

PIEDMONT VIRGINIA COMMUNITY COLLEGE VIII HUMAN RESOURCES / PERSONNEL POLICIES VIII 13.0 EMPLOYEE SEPARATION POLICY PIEDMONT VIRGINIA COMMUNITY COLLEGE VIII HUMAN RESOURCES / PERSONNEL POLICIES VIII 13.0 EMPLOYEE SEPARATION POLICY Policy #: VIII 13.0 Effective: Revised: 6/1/2015 Responsible Dept.: Human Resources I.

More information

4.4 ALCOHOLIC BEVERAGES

4.4 ALCOHOLIC BEVERAGES Approving Authority: President Original Approval Date: July 29, 1994 Date of Most Recent Review/Revision: July 2007 Office of Accountability: Vice-President: Finance & Administration Administrative Responsibility:

More information

ADMINISTRATIVE POLICY #45-11(2015) COMMUNICATION VIA ELECTRONIC MAIL

ADMINISTRATIVE POLICY #45-11(2015) COMMUNICATION VIA ELECTRONIC MAIL Policy Title: Communication via Electronic Mail Policy Type: Administrative Policy Policy Number: 45-11 (2015) Approved: 09/22/2015 Responsible Office: Human Resources/Student Affairs Responsible Executive:

More information

IT Operations User Access Management Policies

IT Operations User Access Management Policies 1. Approval and Authorisation Completion of the following signature blocks signifies the review and approval of this Process (signed copy held in safe) Name Job Title Signature Date Authored by:-

More information

CORPORATE POLICY BACKGROUND AS-2004-2007 POLICY NUMBER: POLICY TITLE: OWNER: Vice President, Academic APPROVED BY: Mohawk College Council

CORPORATE POLICY BACKGROUND AS-2004-2007 POLICY NUMBER: POLICY TITLE: OWNER: Vice President, Academic APPROVED BY: Mohawk College Council CORPORATE POLICY POLICY NUMBER: POLICY TITLE: OWNER: APPROVED BY: AS-2004-2007 Course Outline Vice President, Academic Mohawk College Council EFFECTIVE: May 14, 2007 REFERENCE: LINKS TO OTHER POLICY: BACKGROUND

More information

Statewide Electronic Communications and Technology Ethics in Minnesota

Statewide Electronic Communications and Technology Ethics in Minnesota Pine Technical College Policy and Procedure Policy Number: 700 Date: 03/20/00 Revision Date: Division/Department: Information Systems Author: Ken Ries Subject: Statewide Electronic Communications and Technology

More information

J 1 Scholar Department Sponsorship

J 1 Scholar Department Sponsorship J 1 Scholar Department Sponsorship The purpose of the J 1 Exchange Visitor Program is to increase the mutual understanding between the people of the United States and the people of other countries by means

More information

Information Security Policy

Information Security Policy Information Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED

More information

Information Systems Security Policy

Information Systems Security Policy Information Systems Security Policy University of South Alabama Computer Services Center University of South Alabama 5840 USA Drive South 251-460- 6161 5/19/2014 Outline 1 Introduction... 2 Data Retrieval

More information

ITS Policy Library. 11.08 - Use of Email. Information Technologies & Services

ITS Policy Library. 11.08 - Use of Email. Information Technologies & Services ITS Policy Library 11.08 - Use of Email Information Technologies & Services Responsible Executive: Chief Information Officer, WCMC Original Issued: December 15, 2010 Last Updated: February 3, 2015 POLICY

More information

History Graduate Program Handbook

History Graduate Program Handbook History Graduate Program Handbook Introduction: Welcome to the history department at the University of Miami. We pride ourselves on providing a close individualized training for the next generation of

More information

Compliance Audit Report Texas A&M University--Kingsville Principal Certification Program

Compliance Audit Report Texas A&M University--Kingsville Principal Certification Program Compliance Audit Report Texas A&M University--Kingsville Principal Certification Program According to Texas Administrative Code (TAC) 228.10(c), An entity approved by the SBEC under this chapter shall

More information

OLEY VALLEY SCHOOL DISTRICT

OLEY VALLEY SCHOOL DISTRICT No. 829 SECTION: OPERATIONS OLEY VALLEY SCHOOL DISTRICT TITLE: ELECTRONIC SIGNATURES ADOPTED: February 19, 2015 REVISED: 829. ELECTRONIC TRANSACTIONS, RECORDS AND SIGNATURES 1. Purpose 2. Authority 73

More information

COLORADO COMMUNITY COLLEGE SYSTEM SYSTEM PRESIDENT S PROCEDURE ELECTRONIC COMMUNICATIONS MANAGEMENT AND RETENTION PROCEDURES

COLORADO COMMUNITY COLLEGE SYSTEM SYSTEM PRESIDENT S PROCEDURE ELECTRONIC COMMUNICATIONS MANAGEMENT AND RETENTION PROCEDURES Page 1 of 6 SP 3-125d COLORADO COMMUNITY COLLEGE SYSTEM SYSTEM PRESIDENT S PROCEDURE ELECTRONIC COMMUNICATIONS MANAGEMENT AND RETENTION PROCEDURES EFFECTIVE: June 14, 2009 REFERENCE: BP 3-125; Electronic

More information

When Completed: This procedure is performed whenever personnel actions are needed.

When Completed: This procedure is performed whenever personnel actions are needed. Effective Date: April 27, 2015 Revised Date: April 20, 2015 Prepared By: Stacie Bell Approved By: Mona Adkins-Easley Next Review Date: April 27, 2016 Title: Purpose: Scope: Personnel Action Form Procedure

More information

The committee appointed by the Dean/Librarian to conduct the hiring process within the appropriate academic unit.

The committee appointed by the Dean/Librarian to conduct the hiring process within the appropriate academic unit. Policy Name: Policy and Procedures Regarding Academic Staff Hiring at Carleton University Originating/Responsible Department: Office of the Provost and Vice-President (Academic) Approval Authority: Date

More information

Institutional Quality Assurance Process. University of Ottawa

Institutional Quality Assurance Process. University of Ottawa Institutional Quality Assurance Process University of Ottawa June 27, 2011 Table of Contents 1. INTRODUCTION...1 1.1 Authorities...1 1.2 Contact person...1 1.3 Definitions...1 1.4 Evaluation of programs...2

More information

STATUTORY INSTRUMENTS 2012 No. _

STATUTORY INSTRUMENTS 2012 No. _ STATUTORY INSTRUMENTS 2012 No. _ THE ELECTRONIC SIGNATURES REGULATIONS 2012 ARRANGEMENT OF REGULATIONS Regulation PART I-PRELIMINARY 1. Title. 2. Interpretation PART II - LICENSING AND RECOGNITION OF CERTIFICATION

More information

Chapter 2.82 - RECORDS MANAGEMENT Sections:

Chapter 2.82 - RECORDS MANAGEMENT Sections: Chapter 82 - RECORDS MANAGEMENT Sections: 8010 - Government records findings Recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake

More information

Recommendations for Improving Purchasing Card Procedures

Recommendations for Improving Purchasing Card Procedures Recommendations for Improving Purchasing Card Procedures I. Cardholder Issues: 1. Receipts are not provided for all card charges. A. Current Policy Statement: The Cardholder must: Obtain all sales slips,

More information

Classroom Disruption Policy May 5, 2010

Classroom Disruption Policy May 5, 2010 Classroom Disruption Policy May 5, 2010 Purpose of this Policy Northern Arizona University respects the rights of faculty to teach and students to learn while supporting the principle of freedom of expression.

More information

I certify that the above proposal has been reviewed and approved by the appropriate Department and College/School committees:

I certify that the above proposal has been reviewed and approved by the appropriate Department and College/School committees: OAKLAND UNIVERSITY GRADUATE COUNCIL Graduate Education 520 O Dowd Hall Modify Approved Graduate Academic Program The Graduate Council approves all major curriculum changes, deletions and additions to graduate

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Instructions for Completing the Authorization for Professional Services (APS) Form

Instructions for Completing the Authorization for Professional Services (APS) Form Instructions for Completing the Authorization for Professional Services (APS) Form Purpose This form is required for authorization to engage and pay individuals as guest lecturers and for other one-time,

More information

THESIS REQUIREMENT FOR M.S. STUDENTS

THESIS REQUIREMENT FOR M.S. STUDENTS ECE Graduate Student Affairs Engineering Building I, Second Floor 9500 Gilman Drive, La Jolla, CA 92093-0407 Phone: (858) 822-0273 Email: ecegradaffairs@ece.ucsd.edu THESIS REQUIREMENT FOR M.S. STUDENTS

More information

IT Change Management Policy

IT Change Management Policy Date of effect 24 November 2011 Approval Vice Chancellor Documents replaced by this N/A policy Procedures and/or guidelines supporting this policy A. Introduction Purpose IT Change Management Policy 1.

More information

PROCEDURES FOR THE APPOINTMENT OF READERS

PROCEDURES FOR THE APPOINTMENT OF READERS PROCEDURES FOR THE APPOINTMENT OF READERS Contents 1. Introduction...1 2. Definitions and Nomenclature...2 3. Professorial Board...2 4. Procedures for the Appointment of Readers...3 5. Procedures for accelerated

More information

UNIVERSITY OF FLORIDA POSITION SALARY DATA AND RELATED INFORMATION FOR SELECTED MAJOR ADMINISTRATIVE POSITIONS SINGLE CAMPUS INSTITUTION 1998-99

UNIVERSITY OF FLORIDA POSITION SALARY DATA AND RELATED INFORMATION FOR SELECTED MAJOR ADMINISTRATIVE POSITIONS SINGLE CAMPUS INSTITUTION 1998-99 102.00 Chief Executive Officer of a Single University President M $229,439 Institution (President/Chancellor) Reports to Board of Regents 201.00 Chief Academic Officer Provost and Vice President, F $225,025

More information

Guideline for E-mail Services

Guideline for E-mail Services Guideline for E-mail Services Under the Policy on Information Technology, the Vice-President and Provost is authorized to establish guidelines for information technology services at the University of Toronto.

More information

RUTGERS POLICY. Approval Authority: Executive Vice President for Academic Affairs and Senior Vice President for Administration

RUTGERS POLICY. Approval Authority: Executive Vice President for Academic Affairs and Senior Vice President for Administration RUTGERS POLICY Section: 30.4.5 Section Title: Business Services Policy Name: Records Management Formerly Book: Formerly Policy 50.3.10 Approval Authority: Executive Vice President for Academic Affairs

More information