IT Services Standard Faculty Service Access
|
|
- Rosalind O’Connor’
- 8 years ago
- Views:
Transcription
1 IT Services Revision History IT Services Standard Faculty Service Access Revision and Review Version Version Date Status Summary of Changes Author 0.1 Oct 8, 2013 Draft Initial Draft Kevin Vadnais 0.2 Nov 7, 2013 Draft Modifications as suggested by ITS leaders, as well as changes to include the retention of academic staff data until a more formal project can decide on permanent action. 1.0 Nov 18, 2103 Final Added Appendix A and made final formatting changes 1.1 Nov 29, 2013 Update Changed some aspects of the Library Services Kevin Vadnais, Project Team, ITS Leaders Kevin Vadnais Leona Jacobs Document Reviews Reviewer Name and Title Date Darren Schell, Manager, Transformation Solutions Nov 7, 2013 IT Services Standard Page 1 of 4
2 Authority & Alignment Authority UNIVERSITY OF LETHBRIDGE INFORMATION AND TECHNOLOGY MANAGEMENT POLICY Subsection 4 Privacy, Information Security, and Identity Management Subsection 5 Information Management Alignment Provincial Post-Secondary System ITM Strategic Direction Priority High Quality Teaching and Learning Environment Overview This standard specifies the terms and conditions of granting and revoking access to University Services for faculty members. Scope This Standard applies to all accounts held by academic staff defined as individuals appointed as academic staff by the University of Lethbridge Board of Governors. This includes both full time and part time positions as well as sessional instructors. This document applies only to the process of granting and revoking access to and data services, and does not cover any aspect of or data storage/retention. Compliance & Exceptions Exceptions to this standard must follow the exception process defined below. Failure to comply with this standard may result in disciplinary action. Disciplinary actions shall follow established University policies and procedures and shall be in accordance with the applicable Faculty Handbook, Sessional Lecturers Handbook, collective agreement and employee manuals. Standard Requirements Access to University services for academic staff members happens automatically upon the successfully processing of a Payroll Authorization Form (PAF) in the Banner ERP system. These services include the following: 1. a business account 2. Wireless Access to the UofL wireless network on campus IT Services Standard Page 2 of 4
3 3. VPN Access to the Virtual Private Network software for connecting to campus network resources from off-campus. 4. A backed up storage space for working files. This storage space is backed up and accessible from any computer logged into on campus. 5. Library services 6. Other various security groups as required for administrative purposes and access to network shared storage spaces. Some services not specified by this standard may require additional forms to be filled out, but these requests will be dealt with on a case-by-case basis. These services will remain in place throughout the academic staff member s career at the University. When the academic staff member terminates employment with the University, actions are taken to remove access to these services. The revocation of each service is as follows: 1. VPN, Security Groups and Wireless Access to these services is removed on the effective date of termination. 2. Access to their business will be removed immediately after the effective date of termination passes. If business needs require it, services can be accessed again through the exception process outlined below. For a short amount of time, an automated message will be created to inform senders that the account is no longer active and they should direct their correspondence to a different source. a. For those Academic staff who are retiring from the University in good standing, provisions will be made to retain their services as recognition of service. b. The contents of an Academic staff member s will not be deleted after termination of employment with the University. His/her mailbox will be archived and stored for data retention purposes 3. File Services Access to the content on the file storage space will be removed immediately after the effective date of termination passes and can be granted back using the exception process outlined below. a. Academic staff member file and web content located on University storage will not be deleted after termination of employment with the University. 4. Library Services continued access to library services will be determined by the Library s Access Policy (to information resources and as approved by the University s General Faculties Council). 5. Section 2.b and 3.a will only be carried out until a project has been completed that addresses academic and research data retention issues. These sections are IT Services Standard Page 3 of 4
4 not intended to be a permanent operational activity and will be removed once the retention project has concluded. Exception Process Any exceptions to this policy must be approved in writing by the chair of the academic staff member s department, the Dean or Librarian of the respective Faculty/Department/School, and the Provost, subject to the Faculty Handbook and Sessional Lecturers Handbook. Each request will then be processed by the Information Security Office. The exception request form must include the following information: 1. The account holder information (name, username, contact method) 2. The details of the exception (what service is being altered, why the exception is required) 3. The dates for the duration of the exception (start date, end date) 4. Authorizing signature of the Chair, Dean, and Provost. Related Content Type Policy Title Information and Technology Management Policy Data Classification The information in this document is classified as: Public. Measurement Active access for academic staff members should not be discovered during annual audits after their terminations have been processed, with the exception of retiree s services. 100% of all exceptions will have associated forms available for auditing purposes upon request Contact Kevin Vadnais Manager, Information Security Office IT Services Standard Page 4 of 4
5 Authorization & Signature Mark Humphries, CIO Date IT Services Standard Page 5 of 4
6 Appendix A Exception Guidelines There are some circumstances where individuals may be members of multiple user groups. This may lead to confusion about which set of standards should apply in a given situation. This appendix is meant to offer some suggestions where a clear exception case is not evident. As new situations arise that require clarity, this section will be updated appropriately. 1. A continuing employee or academic staff member who is also registered as a student is terminated. In this situation, it would be advisable to do the following: a. Treat the termination as an employee/academic staff termination and remove access to the address and staff file services immediately. b. Rename the account to a new address for the individual and modify affected class/student mailing lists to ensure continued receipt of student related materials. This prevents future business correspondence from arriving in the students account. 2. A continuing employee or academic staff member who also has alumni status is terminated. In this situation, it would be advisable to do the following: a. Treat the termination as an employee/academic staff termination and remove access to and staff file services immediately. b. If not previously done, create a new alumni address for the individual (@alumni.uleth.ca). This prevents future business correspondence from arriving in the individual s account. A message indicating the new alumni status and address may be added to the terminated employee account to help redirect personal communications. IT Services Standard Page 6 of 4
IT Services. IT Services Standard. Data Storage Security
IT Services IT Services Standard Data Storage Security Revision and Review Revision History Version Version Date Status Summary of Changes Author 0.1 Mar 24, 2015 Draft Initial draft Kevin Vadnais 0.2
More informationQUALITY ASSURANCE HANDBOOK. Policies, procedures and resources to guide undergraduate and graduate program development and improvement at UOIT
QUALITY ASSURANCE HANDBOOK Policies, procedures and resources to guide undergraduate and graduate program development and improvement at UOIT UOIT Academic Council June 15, 2010, revised June 9, 2011 QUALITY
More informationMinnesota State Colleges and Universities System Guideline Chapter 5 Administration
Minnesota State Colleges and Universities System Guideline Chapter 5 Administration Appropriate Use and Implementation of Electronic Part 1. Purpose. To establish requirements and responsibilities for
More informationEmail policy and practice
Email policy and practice This policy applies to all staff (including agency workers, casual and temporary staff), visitors, contractors, students, alumni and researchers of Anglia Ruskin University, and
More informationPolicy # 5.58 SOUTHERN UTAH UNIVERSITY Date Approved: 01/13/12
Page 1 of 6 I. PURPOSE Electronic mail (e-mail) has become an essential service greatly enhancing communication both within the Southern Utah University community and to external users, including prospective
More informationElectronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention
More informationInformation Technology Control Procedures For Eligibility to Access University Banner Information System
Scope: This document establishes IT Control requirements for requesting access to the University s ERP Banner System as well as the responsibilities of stewardship to protect University information. I.
More informationCentral Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with
More informationGovernance Processes and Organizational Structures for Information Management
UNIVERSITY BUSINESS EXECUTIVE ROUNDTABLE Governance Processes and Organizational Structures for Information Management Custom Research Brief Research Associate Lauren Edmonds Research Manager Priya Kumar
More informationINFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES
INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using
More informationTuition Assistance Degree Completion
HR 04 Tuition Assistance Degree Completion Classification: Responsible Authority: Executive Sponsor: Approval Authority: Human Resources First Approved: 2010-10-27 Last Reviewed: 2011-02-02 Mandatory Review
More informationADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY
ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY PURPOSE The value of data as an institutional resource is increased through its widespread and appropriate use; its value is diminished through misuse,
More informationEffective Date: Oct. 27, 2009... 1
Policy Title: Office of Information Technology Email Usage and Retention Policy Policy No.: 7010 Rev.: 0 Effective Date: Oct. 27, 2009 Last Revision: Oct. 27, 2009 Responsible Office: Responsible Official:
More informationInstitutional Handbook of Operating Procedures (IHOP)
Institutional Handbook of Operating Procedures (IHOP) Section: Section 12 Academic Education and Student Related First Release Date: Policy Name: 12.2 Credentials for Faculty in Degree Programs Offered
More informationIT Investment and Business Process Performance: Survey Questionnaire
IT Investment and Business Process Performance: Survey Questionnaire Thank you for participating in the study being conducted by the EDUCAUSE Center for Applied Research (ECAR). This survey is a critical
More informationHAVERFORD COLLEGE IITS: POLICY AND PLANNING
Contents: 1. Preface 2. Policy 3. Audit and Compliance Section 1. Preface A. Name. The formal name of this policy is the Policy. B. Status of This Policy 1. Draft. Completed 4/11/2013 2. Public Review
More informationRowan University Data Governance Policy
Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data
More informationIV. Conditions of Academic Appointment
IV. Conditions of Academic Appointment A. Locus of Authority IIT is a private university. The ultimate authority to determine policy and conditions of academic appointment resides with the Board of Trustees
More information2011 Outcomes Assessment Accreditation Handbook
2011 Outcomes Assessment Accreditation Handbook Associate Degree Programs Baccalaureate Degree Programs Master Degree Programs Accreditation Policies can be found in a separate document on the ATMAE website
More informationCURRICULUM MODIFICATIONS: GRADUATE AND UNDERGRADUATE PROGRAMS
RYERSON UNIVERSITY POLICY OF SENATE CURRICULUM MODIFICATIONS: GRADUATE AND UNDERGRADUATE PROGRAMS Policy Number: 127 Approval Date: November 4, 2014 Previous Approval Dates: May 3, 2011 Policy Review Date
More informationSolution Brief. Archiving from Office 365 for Compliance and ediscovery. 1) Capture Everything
Solution Brief Archiving from Office 365 for Compliance and ediscovery Barracuda Message Archiver enhances Office 365 with the additional functionality needed to support sound information governance practices.
More informationInternational Partnerships
Office of International Programs Guidelines for Establishing International Partnerships What is an international cooperative partnership? An international cooperative partnership is a reciprocal relationship
More informationTitle: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
More informationJob Aid Notice Of Voluntary Separation Workflow
Title Job Aid Notice Of Voluntary Separation Workflow Date March 2009 Written by Julie Kennedy, IS Technical Training Copyright Kent State University and Sungard Higher Education, 2009 Process Owner Human
More informationNewcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
More informationAdvisor mywku Tabs and Pages
Advisor mywku Tabs and Pages mywku will use tabs and pages to separate and classify information. Everyone will have a mywku tab which has a Campus Info page that everyone sees and then will have personal
More informationBLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
More informationInformation Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
More informationINSTITUTIONAL QUALITY ASSURANCE POLICY
INSTITUTIONAL QUALITY ASSURANCE POLICY Approval: Responsibility: Contact Office: University Senate; Ontario Universities Council on Quality Assurance (Quality Council) Provost and Vice President Academic
More informationResponsible Use of Technology and Information Resources
Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni
More informationMUNICIPALITY of COLCHESTER PURCHASING CARD POLICY. January 2006
MUNICIPALITY of COLCHESTER PURCHASING CARD POLICY January 2006 Purpose: Purchasing card programs are designed to provide an efficient and lowcost method of purchasing and paying for small dollar and high
More informationNorwich University Information Assurance Security Policy. Final Version 10.0 for Implementation
Norwich University Information Assurance Security Policy Final Version 10.0 for Implementation Table of Contents Norwich University... 0 Information Assurance Security Policy... 0 1.0 Introduction... 2
More informationAccess Control Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
More informationPARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN. Email Management and Data Storage Policy. Version 1.4
PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN Email Management and Data Storage Policy Version 1.4 Document Control Title: Reference: Original Author(s): Owner: Distribution: Reviewed by: Quality Assured
More informationPolicies and Procedures
Policies and Procedures STUDENTS REVOKING DEGREES In Fall 2010, GFC Executive directed the Associate Vice President/Registrar to develop a policy which would govern the revocation of degrees granted by
More informationRecords Retention Procedure
Records Retention Procedure 1. Purpose The purpose of this procedure is to ensure all necessary records and documents are adequately provided, maintained, and comply with record retention requirements
More informationRECORDS AND INFORMATION MANAGEMENT AND RETENTION
RECORDS AND INFORMATION MANAGEMENT AND RETENTION Policy The Health Science Center recognizes the need for orderly management and retrieval of all official records and a documented records retention and
More informationAUBnet (email) Accounts Policies
(email) s Policies Reference: CNS-P-Acct Revision: B Supersedes: Purpose: Source: CNS-P-EMAIL-A This policy and related policies provide the framework in which all accounts and email and intranet are provided
More informationNew Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
More informationRecords Management Manual of the University of Nevada Las Vegas Table of Contents
Records Management Manual of the University of Nevada Las Vegas Table of Contents Part 1: Overview of Records Management at the University of Nevada Las Vegas... 2 1.1 PROGRAM RATIONALE, RESPONSIBILITIES
More informationCal Poly Information Security Program
Policy History Date October 5, 2012 October 5, 2010 October 19, 2004 July 8, 2004 May 11, 2004 January May 2004 December 8, 2003 Action Modified Separation or Change of Employment section to address data
More informationHow To Protect Data At Northeast Alabama Community College
Information Systems Security Policy Northeast Alabama Community College Center for Information Assurance Northeast Alabama Community College 138 AL Hwy 35, Rainsville, AL 35986 (256) 228-6001 1 5/22/2014
More informationGUIDELINES FOR ACADEMIC PROGRAM REVIEW For self-studies due to the Office of the Provost on October 1, 2015 GRADUATE PROGRAMS
GUIDELINES FOR ACADEMIC PROGRAM REVIEW For self-studies due to the Office of the Provost on October 1, 2015 GRADUATE PROGRAMS OVERVIEW OF PROGRAM REVIEW At Illinois State University, primary responsibility
More informationAPPOINTMENT TO AND PROMOTION OF ACADEMIC STAFF
This policy applies to Faculty only. Appointment Types APPOINTMENT TO AND PROMOTION OF ACADEMIC STAFF In policies, practices, and procedures related to faculty appointments, the University shall not engage
More informationIdentity and Access Management Policy
Page 1 of 5 Identity and Access Management Policy Reference number 0605-IAM Interim HEMIS Classification 0605 Purpose Date of implementation 1 December 2012 Review date Previous reviews Policy owner Policy
More informationInformation Management and Protection Policy
Document Title: Information Management and Protection Policy Document Type: Policy No. Of Pages (11) Scope: Government of Newfoundland and Labrador and Public Bodies supported by the Office of the Chief
More informationInformation Technology Services
Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT
More informationThe Belk College of Business Policy Statement on Academic and Professional Qualifications
The Belk College of Business Policy Statement on Academic and Professional Qualifications The Belk College of Business is committed to maintaining a faculty of high quality that is consistent with its
More informationFAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY
FAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY Authority: Category: Applies to: Chancellor, Fayetteville State University University-wide Faculty, Staff, and Students History: Approved on
More informationSoftware Engineering Methodology. Appendix F Computer System Retirement Guidelines
Software Engineering Methodology Appendix F Computer System Retirement Guidelines Overview Purpose: This procedure establishes the process for the orderly retirement of information systems regardless of
More informationACADEMIC APPOINTMENTS GUIDELINES
OREGON STATE UNIVERSITY ACADEMIC APPOINTMENTS GUIDELINES May 2013 Published by Office of Academic Affairs Office of Human Resources Date Posted: 08/06/15 TABLE OF CONTENTS Section Page I. OSU Policies
More informationAcademic Personnel Office Records Retention Schedule. Retain ten years past separation/retirement, then shred. Shred upon death.
1 Academic Personnel Office Records Retention Schedule Record Title Description Disposition Ladder Rank & Lecturer PSOE/SOE academic personnel review files including academic dean/provost administrative
More informationDiscovery Technology Group
Discovery Technology Group E-mail Retention: Readiness Survey E-mail now represents the largest source of new documents and records generated within a company, and the most troublesome from a retention
More informationApproved by: Vice President, Human Resources & Corporate Resources and Vice President, Treasury & Compliance Date: October 14, 2009
RECORDS AND INFORMATION Approved by: Vice President, Human Resources & Corporate Resources and Vice President, Treasury & Compliance Date: October 14, 2009 PURPOSE Penn West recognizes that responsible
More informationStandard Operating Procedure. Authority to access and monitor University IT Account holder communications and data
Standard Operating Procedure Title: Authority to access and monitor University IT Account holder communications and data Version: 2.0 Effective Date March 2016 Summary Describes the approval process and
More informationITS Policy Library. 11.08 - Use of Email. Information Technologies & Services
ITS Policy Library Information Technologies & Services Responsible Executive: Chief Information Officer, WCMC Original Issued: December 15, 2010 Last Updated: September 18, 2015 POLICY STATEMENT... 3 REASON
More informationStandard Operating Procedures for Blackboard Policy
Services Standard Operating Procedures for Blackboard Policy Table of Contents 01 Policy Statement... 2 02 Information Services (ITS) and the... 2 03 Blackboard and the Banner Student Information System...
More informationTuition and Fees 2014-2015. Academic and Registration Info
Tuition and Fees 2014-2015 Academic and Registration Info North Idaho College 31 2014-2015 REGISTRATION Registration is the official process of enrolling in classes. NIC is on a 16-week Fall/Spring Semester,
More informationHOW GRANT THOU ART? Grant Administration Process
HOW GRANT THOU ART? Pre Application Authorization Post Administration More Grants, Grant $s and Awareness Grant Administration Process Owens Community College Summer 2007 GRANTS ADMINISTRATION PROCESS
More informationCollege of Education Computer Network Security Policy
Introduction The College of Education Network Security Policy provides the operational detail required for the successful implementation of a safe and efficient computer network environment for the College
More informationPayment Card Industry (PCI) Policy Manual. Network and Computer Services
Payment Card Industry (PCI) Policy Manual Network and Computer Services Forward This policy manual outlines acceptable use Black Hills State University (BHSU) or University herein, Information Technology
More informationPOLICIES AND REGULATIONS Policy #78
Peel District School Board POLICIES AND REGULATIONS Policy #78 DIGITAL CITIZENSHIP Digital Citizenship Digital citizenship is defined as the norms of responsible behaviour related to the appropriate use
More informationInformation Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
More informationBCSD WebMail Documentation
BCSD WebMail Documentation Outlook Web Access is available to all BCSD account holders! Outlook Web Access provides Webbased access to your e-mail, your calendar, your contacts, and the global address
More informationThe University of Toledo Academic Affairs Committee Meeting Higher Learning Commission and Strategic Planning
The University of Toledo Academic Affairs Committee Meeting Higher Learning Commission and Strategic Planning David Cutri May 11, 2015 Higher Learning Commission Academic accrediting body for the University
More informationAcademic and Administrative Space Policy
University of California, Merced Academic and Administrative Space Policy Responsible Official: Provost/Executive Vice Chancellor Responsible Office: Real Estate Services Group, Division of Planning and
More informationUniversity of Illinois at Urbana-Champaign Voluntary Retirement Program. For Retirement-Eligible Tenured Faculty and Other Academic Staff
University of Illinois at Urbana-Champaign Voluntary Retirement Program For Retirement-Eligible Tenured Faculty and Other Academic Staff February 3, 2010 TABLE OF CONTENTS INTRODUCTION...1 PROGRAM DESCRIPTION...1
More informationADMINISTRATIVE PROCEDURE Staff Salary Administration
ADMINISTRATIVE PROCEDURE Staff Related Policy: 1.6.2 (Staff) These procedures have been established to implement UNT Policy 1.6.2, (Staff). These procedures apply to staff positions categorized as regular
More informationThe University of Research and Development Centers
Centers & Institutes Description Centers and institutes are established within the University to strengthen and enrich programs of research, instruction or public service conducted by the faculty and staff.
More informationWright State University Information Security
Wright State University Information Security Controls Policy Title: Category: Audience: Reason for Revision: Information Security Framework Information Technology WSU Faculty and Staff N/A Created / Modified
More informationPIEDMONT VIRGINIA COMMUNITY COLLEGE VIII HUMAN RESOURCES / PERSONNEL POLICIES VIII 13.0 EMPLOYEE SEPARATION POLICY
PIEDMONT VIRGINIA COMMUNITY COLLEGE VIII HUMAN RESOURCES / PERSONNEL POLICIES VIII 13.0 EMPLOYEE SEPARATION POLICY Policy #: VIII 13.0 Effective: Revised: 6/1/2015 Responsible Dept.: Human Resources I.
More information4.4 ALCOHOLIC BEVERAGES
Approving Authority: President Original Approval Date: July 29, 1994 Date of Most Recent Review/Revision: July 2007 Office of Accountability: Vice-President: Finance & Administration Administrative Responsibility:
More informationADMINISTRATIVE POLICY #45-11(2015) COMMUNICATION VIA ELECTRONIC MAIL
Policy Title: Communication via Electronic Mail Policy Type: Administrative Policy Policy Number: 45-11 (2015) Approved: 09/22/2015 Responsible Office: Human Resources/Student Affairs Responsible Executive:
More informationIT Operations User Access Management Policies
1. Approval and Authorisation Completion of the following signature blocks signifies the review and approval of this Process (signed copy held in safe) Name Job Title Signature Date Authored by:-
More informationCORPORATE POLICY BACKGROUND AS-2004-2007 POLICY NUMBER: POLICY TITLE: OWNER: Vice President, Academic APPROVED BY: Mohawk College Council
CORPORATE POLICY POLICY NUMBER: POLICY TITLE: OWNER: APPROVED BY: AS-2004-2007 Course Outline Vice President, Academic Mohawk College Council EFFECTIVE: May 14, 2007 REFERENCE: LINKS TO OTHER POLICY: BACKGROUND
More informationStatewide Electronic Communications and Technology Ethics in Minnesota
Pine Technical College Policy and Procedure Policy Number: 700 Date: 03/20/00 Revision Date: Division/Department: Information Systems Author: Ken Ries Subject: Statewide Electronic Communications and Technology
More informationJ 1 Scholar Department Sponsorship
J 1 Scholar Department Sponsorship The purpose of the J 1 Exchange Visitor Program is to increase the mutual understanding between the people of the United States and the people of other countries by means
More informationInformation Security Policy
Information Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED
More informationInformation Systems Security Policy
Information Systems Security Policy University of South Alabama Computer Services Center University of South Alabama 5840 USA Drive South 251-460- 6161 5/19/2014 Outline 1 Introduction... 2 Data Retrieval
More informationITS Policy Library. 11.08 - Use of Email. Information Technologies & Services
ITS Policy Library 11.08 - Use of Email Information Technologies & Services Responsible Executive: Chief Information Officer, WCMC Original Issued: December 15, 2010 Last Updated: February 3, 2015 POLICY
More informationHistory Graduate Program Handbook
History Graduate Program Handbook Introduction: Welcome to the history department at the University of Miami. We pride ourselves on providing a close individualized training for the next generation of
More informationCompliance Audit Report Texas A&M University--Kingsville Principal Certification Program
Compliance Audit Report Texas A&M University--Kingsville Principal Certification Program According to Texas Administrative Code (TAC) 228.10(c), An entity approved by the SBEC under this chapter shall
More informationOLEY VALLEY SCHOOL DISTRICT
No. 829 SECTION: OPERATIONS OLEY VALLEY SCHOOL DISTRICT TITLE: ELECTRONIC SIGNATURES ADOPTED: February 19, 2015 REVISED: 829. ELECTRONIC TRANSACTIONS, RECORDS AND SIGNATURES 1. Purpose 2. Authority 73
More informationCOLORADO COMMUNITY COLLEGE SYSTEM SYSTEM PRESIDENT S PROCEDURE ELECTRONIC COMMUNICATIONS MANAGEMENT AND RETENTION PROCEDURES
Page 1 of 6 SP 3-125d COLORADO COMMUNITY COLLEGE SYSTEM SYSTEM PRESIDENT S PROCEDURE ELECTRONIC COMMUNICATIONS MANAGEMENT AND RETENTION PROCEDURES EFFECTIVE: June 14, 2009 REFERENCE: BP 3-125; Electronic
More informationWhen Completed: This procedure is performed whenever personnel actions are needed.
Effective Date: April 27, 2015 Revised Date: April 20, 2015 Prepared By: Stacie Bell Approved By: Mona Adkins-Easley Next Review Date: April 27, 2016 Title: Purpose: Scope: Personnel Action Form Procedure
More informationThe committee appointed by the Dean/Librarian to conduct the hiring process within the appropriate academic unit.
Policy Name: Policy and Procedures Regarding Academic Staff Hiring at Carleton University Originating/Responsible Department: Office of the Provost and Vice-President (Academic) Approval Authority: Date
More informationInstitutional Quality Assurance Process. University of Ottawa
Institutional Quality Assurance Process University of Ottawa June 27, 2011 Table of Contents 1. INTRODUCTION...1 1.1 Authorities...1 1.2 Contact person...1 1.3 Definitions...1 1.4 Evaluation of programs...2
More informationSTATUTORY INSTRUMENTS 2012 No. _
STATUTORY INSTRUMENTS 2012 No. _ THE ELECTRONIC SIGNATURES REGULATIONS 2012 ARRANGEMENT OF REGULATIONS Regulation PART I-PRELIMINARY 1. Title. 2. Interpretation PART II - LICENSING AND RECOGNITION OF CERTIFICATION
More informationChapter 2.82 - RECORDS MANAGEMENT Sections:
Chapter 82 - RECORDS MANAGEMENT Sections: 8010 - Government records findings Recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake
More informationRecommendations for Improving Purchasing Card Procedures
Recommendations for Improving Purchasing Card Procedures I. Cardholder Issues: 1. Receipts are not provided for all card charges. A. Current Policy Statement: The Cardholder must: Obtain all sales slips,
More informationClassroom Disruption Policy May 5, 2010
Classroom Disruption Policy May 5, 2010 Purpose of this Policy Northern Arizona University respects the rights of faculty to teach and students to learn while supporting the principle of freedom of expression.
More informationI certify that the above proposal has been reviewed and approved by the appropriate Department and College/School committees:
OAKLAND UNIVERSITY GRADUATE COUNCIL Graduate Education 520 O Dowd Hall Modify Approved Graduate Academic Program The Graduate Council approves all major curriculum changes, deletions and additions to graduate
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
More informationInstructions for Completing the Authorization for Professional Services (APS) Form
Instructions for Completing the Authorization for Professional Services (APS) Form Purpose This form is required for authorization to engage and pay individuals as guest lecturers and for other one-time,
More informationTHESIS REQUIREMENT FOR M.S. STUDENTS
ECE Graduate Student Affairs Engineering Building I, Second Floor 9500 Gilman Drive, La Jolla, CA 92093-0407 Phone: (858) 822-0273 Email: ecegradaffairs@ece.ucsd.edu THESIS REQUIREMENT FOR M.S. STUDENTS
More informationIT Change Management Policy
Date of effect 24 November 2011 Approval Vice Chancellor Documents replaced by this N/A policy Procedures and/or guidelines supporting this policy A. Introduction Purpose IT Change Management Policy 1.
More informationPROCEDURES FOR THE APPOINTMENT OF READERS
PROCEDURES FOR THE APPOINTMENT OF READERS Contents 1. Introduction...1 2. Definitions and Nomenclature...2 3. Professorial Board...2 4. Procedures for the Appointment of Readers...3 5. Procedures for accelerated
More informationUNIVERSITY OF FLORIDA POSITION SALARY DATA AND RELATED INFORMATION FOR SELECTED MAJOR ADMINISTRATIVE POSITIONS SINGLE CAMPUS INSTITUTION 1998-99
102.00 Chief Executive Officer of a Single University President M $229,439 Institution (President/Chancellor) Reports to Board of Regents 201.00 Chief Academic Officer Provost and Vice President, F $225,025
More informationGuideline for E-mail Services
Guideline for E-mail Services Under the Policy on Information Technology, the Vice-President and Provost is authorized to establish guidelines for information technology services at the University of Toronto.
More informationRUTGERS POLICY. Approval Authority: Executive Vice President for Academic Affairs and Senior Vice President for Administration
RUTGERS POLICY Section: 30.4.5 Section Title: Business Services Policy Name: Records Management Formerly Book: Formerly Policy 50.3.10 Approval Authority: Executive Vice President for Academic Affairs
More information