Caldwell Community College and Technical Institute
|
|
|
- Deirdre Heath
- 10 years ago
- Views:
Transcription
1 Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative systems, computer resources and network systems at Caldwell Community College and Technical Institute. II. PROCEDURE: A. INTRODUCTION Caldwell Community College and Technical Institute will provide administrative computer systems to employees and students for the purpose of completing college-related assignments. These assignments include, but are not limited to the following: data entry and retrieval, report preparation, records maintenance, instruction, research, and planning. Because of this wide range of users and uses, it is necessary to establish policies and procedures that assure that the systems are used in the most efficient manner possible while providing for the protection of equipment, data, and software. While the Director of Computer Information Services is charged with responsibility for the proper operation of the computer systems, all college employees are responsible for seeing that the computers are properly used and that security is maintained. B. POLICY While every employee of the College has a responsibility for the computer systems, those who actually use the systems are specifically responsible for data, personal file backup, software, and equipment. Since all of these responsibilities can be considered under the broad category of security, each user must be aware of and employ proper operating procedures to guarantee proper security. Access to the systems will be on a need to know basis, considering the accomplishment of assigned duties. In this context, the system means both the equipment and the data. With approval from the appropriate dean or vice-president, employees may request access from the System Administrator. All employees have a responsibility to become familiar with the principles and capabilities of the College computer systems.
2 C. PROCEDURES 1. DATA RETRIEVAL Non-routine requests for data (one-time reports and/or special requests) should be made in writing to the Computer Information Services staff. The request will be approved or disapproved based on justification provided by the requester. The request must specify the data elements to be used, the report format, and the time when it is needed so that the Computer Information Services staff involved may schedule the work. If a request is denied, it will be done so in writing with full justification. 2. SECURITY Security refers to the protection of equipment from any kind of damage and the protection of data from (1) disclosure to any unauthorized person, (2) unauthorized modification, or (3) destruction. While disclosure or damage may occur accidentally or intentionally, the results are the same. The security system implemented in these procedures will, if used properly, prevent unnecessary problems. a. Basic access to the college computer system is controlled by User ID and password protection. Each user on the system has a personal ID that must not be used by anyone else. The IDs are established by the Computer Information Services Staff as when approved by the appropriate management levels. The College Executive Council may authorize the Computer Information Services Staff to override any user account if sufficient evidence of inappropriate use exists. b. The Caldwell Community College and Technical Institute Administrative Computer User Authorization Form will be submitted through the user s supervisor, the appropriate dean or vice-president, and the System Administrator. Passwords will be changed every 90 days or less and passwords will not be divulged to any other person. If a user is terminated for any reason the Computer Information Services staff must be notified immediately by the supervisor so that the terminated user can be removed from the system. In the case of a supervisor s termination, all of the supervisor s employees must change their login passwords immediately. c. Users will not be granted access to the administrative computer system until they have read and agreed to comply with the provisions of The Family Educational Rights and Privacy Act of 1974 and have signed the
3 Statement of Acknowledgment Concerning Unauthorized Use of Computers and Software by Caldwell Community College and Technical Institute Faculty and Staff. d. Users should not leave their terminal or microcomputer unattended. If a user must leave the immediate area of his/her workstation for an extended period of time, he/she should log off the system. Users should not write their passwords or usernames on paper that is plain view. e. Microcomputer systems and peripherals must have restricted physical access controlled by the individual user. Sensitive information should not be sent to printers that are located in areas open to the public. Offices where computers are located should be kept locked if unoccupied for long periods of time. f. Users are responsible for immediately reporting suspected security violations to the Computer Information Services staff. The Computer Information Services staff will investigate the violation and take appropriate actions where required. g. Central Computer locations are strictly controlled by the Computer Information Services Staff. Personnel will not be allowed to enter the computer room unless authorized by one of the Computer Information Services staff members. There will be no exceptions to this policy. 3. MICROCOMPUTER AND NETWORK SYSTEMS In addition to the administrative and student computing systems, the college owns a large number of other computer-related devices -- primarily microcomputers. While all of the aforementioned security concerns and procedures apply to these devices, the security problem with stored data is much smaller still. Issues concerning the use and protection of software are of major concern with microcomputers. The college does not purchase microcomputer software outright, but rather buys a software license which allows the college to use the software but severely restricts anything other than the use of the software on a single computer or network. With this in mind, the following must be adhered to: a. SOFTWARE: Unless specifically authorized in writing by the software developer or publisher, programs and their related documentation shall not be reproduced in any form. U. S. Copyright Law provides for civil damages of $50,000 or more and criminal penalties, including fines and imprisonment, in cases involving
4 the illegal reproduction of software. Unauthorized copies of software will not be used on any computers owned by the college. Students must be advised of this policy and told that illegal software will be confiscated and destroyed. Caldwell Community College and Technical Institute employees involved in the making or use of unauthorized copies of computer software will be subject to disciplinary action as appropriate under the circumstances. Software licensed to the college will not be removed from the campus without the specific written permission of the department dean involved. Users cannot install or download software that is not work-related onto their systems as this produces unnecessary conflicts with the microcomputer software and performance. Computer Information Services will conduct software audits on a regular schedule. The individual departments and employees will maintain possession of all software licensing agreements. Software placed on a computer that violates the U. S. Copyright Law will be removed from a college computer after the Director of Computer Information Services provides written justification to the individual Vice-President/Dean or employee. b. ELECTRONIC MEDIA: Computer Information Services will practice appropriate measures to provide security, operability and integrity of the Wide Area Network, hereafter referred to as WAN, including , Internet, and other related resources. The College will not guarantee that electronic media stored on microcomputers and transmitted on the WAN will remain confidential and secure. Additionally, computerrelated files and data created or stored on College microcomputer systems are considered open records and are subject to discovery and subpoena during disciplinary and legal actions. The College reserves the right to view, monitor, and disclose the contents of and data created, transmitted, received, and stored on College-owned microcomputers under the following circumstances: 1. Investigations that reveal evidence of misconduct and misuse of accounts. 2. Need to protect the general welfare of the college employees and students. 3. Need to prevent interferences with the mission of the college. 4. Illegal activity that violates federal, state, or local regulations. c. AUTHORIZED USAGE: Microcomputer users should not deliberately attempt to modify or degrade the performance of college-owned systems. The systems are provided as a service and should be used to complete college-related task and not for personal business or recreation. The computer systems must not be used to intercept data, monitor user accounts, gain unauthorized access to restricted data, or for any purpose that violates federal, state or local regulations.
5 d. MORALS AND ETHICS: Freedom of expression is a constitutional right afforded to individuals. However, Microcomputer Systems Users are held accountable for their actions and must respect the rights of individuals who may be offended by the services and images retrieved on the Internet. Individuals that feel they have been harassed should immediately report the incident to the Director of Computer Information Services or the Director of Human Resources. e. PURCHASING: Departments that wish to purchase computer-related equipment and supplies must generate a statement of need to Computer Information Services. Computer Information Services will provide consultation to the individual requesting the purchase, generate the requisition, and submit it to the Business Office for issuance of a purchase order. f. INVENTORY CONTROL: Individuals requesting computer and related equipment transfer and relocation must fill out an Inventory Transaction Form, located in the Business Services Department mailroom, and submit it to Computer Information Services. Computer Information Services will not take any action until the Inventory Transaction Form is completed. Computer Information Services will relocate the computer and related equipment and forward the Inventory Transaction Form to the Business Services Department. g. COMPUTER REPAIR: Individuals requesting repair services from the Computer Information Services Department will submit the white copy of the Computer Information Services Request Form to Computer Information Services. The department requesting service will maintain the pink copy and place the yellow copy on the device(s) requiring service. If the request involves the acquisition of a centralized supply item, the requisition section of the form must be completed and signed by the departmental budget manager. Computer Information Services will provide the action necessary to address the departmental request. Computer Information Services will provide the Business Office with a monthly spreadsheet listing the totals of each individual department s supply acquisition. h. BUDGET PLANNING: The Director of Computer Information Services will provide consultation to each department head concerning his/her annual technology budget request. The individual department heads will submit the technology request to the Director of Computer Information Services. The Director of Computer Information Services will provide the Chief Financial Officer with a compiled listing of each departmental technology request.
6 i. VIOLATIONS: Any employee who learns of a violation of these policies shall report it to their supervisor and to Computer Information Services as soon as possible. Violators of the computer usage policies and procedures previously stated will be subject to one or more of the following sanctions: admonition, temporary or permanent suspension of computer access privileges, or dismissal from the College as stated in the Employee Policy and Procedures Manual. Adopted by the Board of Trustees on June 15, 2000
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Student Computer Usage Policies and Procedures I. Campus Computer Usage Overview: The purpose of this document is to define the policies and procedures
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D
Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D 1. PURPOSE SWC owns and operates a variety of computing systems which are provided for the use of the Sisseton Wahpeton
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4
Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of
2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of San Diego computing and network resources. This policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
Riverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
PHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
Bossier Parish Community College
Bossier Parish Community College Department of Cyber Information Technology Welcome to the Program! Network Security & Networking Tracks Code of Conduct This marks the beginning of your journey through
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
Students KS2-3 Acceptable Use Policy
Students KS2-3 Acceptable Use Policy Page 1 of 5 LITTLEGREEN SCHOOL Student Acceptable Use Policy Pupil access to the school network and Moodle is a privilege, not a right. All pupils must follow the conditions
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
DEPARTMENTAL POLICY. Northwestern Memorial Hospital
Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with
Policy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
PBGC Information Security Policy
PBGC Information Security Policy 1. Purpose. The Pension Benefit Guaranty Corporation (PBGC) Information Security Policy (ISP) defines the security and protection of PBGC information resources. 2. Reference.
Administrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
Acceptable Use Policy
Acceptable Use Policy Department of Information Technology Olivet Nazarene University (815) 939-5302 Published August 2013 Ver. 4.0 Policy Overview 1. Executive Summary This summary is intended to present
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
Information Technology
Information Technology A Handbook for Employees and Students PASSED by FBC BOARD OF DIRECTORS, AUGUST 13, 2006 (Revised 8-10-06) TABLE OF CONTENTS 2 Introduction... 3 Access to Information Technology Resources...
[Acceptable Use Policy]
South College Computer Code of Ethics [Acceptable Use Policy] Introduction Freedom of expression and an open environment to pursue scholarly inquiry and for sharing of information are encouraged, supported,
6415 C Internet, E-mail and Network Rules for Staff Use
6415 C Internet, E-mail and Network Rules for Staff Use Original Adoption: 05/26/2009 Effective Date: 08/13/2014 Revision Dates: 08/12/2014 Review Date: 4/17/2012 I. PURPOSE The purpose of this regulation
Texas University Law - General Use of Technology Resources
Procedure No. 27.99.99.T1.01 (Effective 5/16/03) Computer Use PROCEDURE: Tarleton State University provides each of its students, faculty and staff with one or more computer accounts (user-ids) that permit
APHIS INTERNET USE AND SECURITY POLICY
United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
Account Management Standards
Account Management Standards Overview These standards are intended to guide the establishment of effective account management procedures that promote the security and integrity of University information
Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
AP 417 Information and Communication Services
AP 417 Information and Communication Services Background Access and use of information and communication services (ICS) are an integral component of the learning and working environment. The ability for
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
POLICIES AND REGULATIONS Policy #78
Peel District School Board POLICIES AND REGULATIONS Policy #78 DIGITAL CITIZENSHIP Digital Citizenship Digital citizenship is defined as the norms of responsible behaviour related to the appropriate use
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 I. Statement of Policy The Department of Finance and Administration (DFA) makes
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications
Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.
Town of Essex Comprehensive Public Records and Technology Policy
Town of Essex Comprehensive Public Records and Technology Policy Introduction: Public records and the use of technology are inextricably linked in our modern age. As such, this policy covers both topics,
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
Indiana University of Pennsylvania Information Assurance Guidelines. Approved by the Technology Utilities Council 27-SEP-2002
Indiana University of Pennsylvania Information Assurance Guidelines Approved by the Technology Utilities Council 27-SEP-2002 1 Purpose... 2 1.1 Introduction... 2 1.1.1 General Information...2 1.1.2 Objectives...
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
Electronic Communications System
Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
