World Wide Web Publishing Standard
|
|
|
- Belinda Perkins
- 10 years ago
- Views:
Transcription
1 Issue Date: January 1, 2011 World Wide Web Publishing Standard Office of the Vice President for Operations / CIO Information Security Office Effective Date: November 21, 2014 KSU World Wide Web Publishing Standard 1. Standards for All World Wide Web Content 1.1 Web content must be kept accurate, up-to-date, and conform to editorial standards including spelling, grammar, style, etc. Each unit which creates a home page must assign a faculty or staff member to update content as appropriate. 1.2 Kennesaw State will observe the same copyright rules for its Web content that it does for printed materials. Content may not be published without demonstrated permission of the artist or author. 1.3 Content must not violate applicable export laws and regulations; must not constitute a copyright or trademark infringement; and must not otherwise violate any local, state, or federal laws. 1.4 Content must not be such that it offends the average person, applying contemporary community standards, such as pornography. 1.5 Content must be in compliance with all appropriate Kennesaw State University campus policies and procedures. Special attention should be paid to the section detailing what a user may and may not do with their user account or another s user account. The application of this standard and applicable policy to the World Wide Web will allow immediate termination of any resource that makes excessive use (defined as a volume of traffic constituting a system denial-of-service attack) of network bandwidth without authorization.
2 1.6 No content shall make available any information about the systems providing publishing capabilities, including, but not limited to lists of addresses, security information, and personal information about users on the system, other than the author, without the express permission of that user. 1.7 The preferred name for the University is "Kennesaw State University." 1.8 Authors or originators using trademarked materials must have express permission of the person(s) or organization(s) who own the trademark(s) prior to their use. 1.9 Authors or originators using photos and images may need the permission of not only the person or organization who owns the photo, but also from any individuals or persons included in the image Any use of other copyrighted material must have the express written permission of the person or organization that owns the copyright. The University reserves the right to require proof of such written permission and to remove the material if that proof cannot be produced All Official University Pages and Unofficial University Pages hosted on must meet American Disability Act standards through LIFT text transcoding All content must be audited for potential security vulnerabilities annually. The Information Security Office will coordinate these scans with the respective server administrator(s) in such a way as to minimize any potential web service interruptions. Identified vulnerabilities must be corrected, or exempted by the Vice President for Operations/CIO. 2. Official University Pages The following are in addition to the Standards for all WWW Pages. 2.1 Standards for All Official (Home and Ancillary) Pages University Information Technology Services in cooperation with University Relations will designate all Official Home Pages In order to ensure a degree of continuity, maintain a consistent image, and increase usage of content published by Kennesaw State, the right is reserved to monitor and review the Official University Pages for the University's schools, departments, and all major divisions. Photographs other than those taken by the Kennesaw State photographers should be approved by University Relations before publication.
3 2.1.3 Official University Pages must show the date a document was last modified In the absence of extensive legislation or court decisions regarding the Internet, Kennesaw State will incorporate a brief disclaimer at the bottom of any official page that links to any content other than another official University content noting that: This web page, and others that portray the University's WWW logo with approved links to this page are officially sanctioned by Kennesaw State University. All other linked pages are the responsibility of the respective authors Student Organizations may create web content which must be approved by the Administrative Coordinator of Registered Student Organizations and University Relations. This content must be linked to an appropriate web page managed by the Student Life Center. The University sponsor of each organization should periodically review the content of the student organization's web page. Student organization pages are considered ancillary pages and will be published on a space available basis. 2.2 Additional Standards for Official Home Pages These standards are in addition to Section 2.1 of Appendix B. The Office of University Relations will provide preferred templates combining appropriate style, graphics and icons to be used on official pages so that the institution maintains a visually cohesive image. University Relations will maintain a complete list of the responsible developers and work closely with each to ensure that information is accurate and timely Official Home Pages must have at least one link back to the Kennesaw State University Home Page Official Home Pages must contain a readily-apparent generic contact address or link to the appropriate address of the author or other person responsible for placing information on the Web Official Home Pages representing an administrative unit must have the approval of the unit head. Once the content is completed, University Relations must be contacted for editing and suggested design modifications. When such changes are agreed upon by both parties and made, the content may be added to the server in the appropriate category area. (If University Relations and the unit cannot agree on the recommended changes, the issue should submitted to the Information Technology Advisory Committee for resolution.) 3. Unofficial "Courtesy" University Pages The following are in addition to Section 1, Standards for All WWW Pages
4 3.1 The address or a readily-apparent link back to the appropriate address of the author or other person responsible for publishing content on the World Wide Web shall be displayed on each page. 3.2 Any content discovered in violation of the Policies and Standards shall be subject to immediate removal from the Network, including but not limited to, the possible removal of the individual account from the system. 3.3 The use of the official University graphics, including, but not limited to, logos, seals or other identifying marks is prohibited on unofficial pages Student pages should not be directly linked from official University web pages. Individual departments may elect to provide an index of student pages if the following disclaimer appears prior to the index: "The information contained on student web pages represents the opinions, values and viewpoint of the student and not necessarily that of KSU. The student takes full responsibility for the information presented." 4. Resources through University Information Technology Services University Information Technology Services (UITS) at Kennesaw State University will provide the following resources for electronic publishing via the World Wide Web. 4.1 University Information Technology Services will provide the ability for faculty, staff, and students to use their current Linux accounts to publish content on the World Wide Web. The content of these pages must comply with the above standards and must be contained in each users home directory and comply with current disk quota restrictions. 4.2 University Information Technology Services will provide this resource to faculty, staff, and students on a machine which complies with production level maintenance and security. 4.3 University Information Technology Services will provide a system on which "Official University Pages" and the main Kennesaw State University Home Page will be hosted. Furthermore, this system will provide hosting space for colleges, schools, and departments. As a University critical system, this machine will comply with production level maintenance and security procedures. 4.4 University Information Technology Services will provide the above services in order to provide a place for both "Official" and "Unofficial" University Pages. University Information Technology Services will provide the WWW server and all functions related to running the server (e.g., Security, Disk Space, etc.). University Information Technology Services will not create, modify, or publish content on the provided server. This responsibility falls to each individual school, department, unit, or user.
5 Review Schedule: The World Wide Web Publishing Standard will be reviewed annually by the Office of the Vice President for Operations/CIO or their designee.
SBHC Procedures and Guidelines for Web Publishing
The School Board of Highlands County Management Information Systems department provides Web hosting services to all SBHC schools and departments in the district. The use of the web pages and web sites
WEB DEVELOPMENT POLICIES & PROCEDURES
WEB DEVELOPMENT POLICIES & PROCEDURES Last Updated July 2014 TABLE OF CONTENTS Introduction... 3 Roles and Responsibilities... 4 Webmaster... 4 Web Advisory Group... 4 Content Owners... 4 Content Designee(s)...
KENNESAW STATE UNIVERSITY. 50th Anniversary. Visual Identity Program Usage Guide
VISUAL IDENTITY USAGE GUIDE KENNESAW STATE UNIVERSITY 50th Anniversary Visual Identity Program Usage Guide 2 KSU 50th Anniversary { Visual Identity Program Usage Guide } Dear Campus Community: Welcome
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
Electronic Communication
Electronic Communication Information Technology Policy Identifier: IT-002 Revision Date: 10/1/2015 Effective Date: 10/18/2012 Approved by: BOR Approved on date: 10/18/2012 Table of Contents 1. Introduction...
WEB GUIDELINES Last Updated July 22, 2014
WEB GUIDELINES Last Updated July 22, 2014 Contents INTRODUCTION... 3 GOVERNANCE STRUCTURE... 4 TECHNOLOGY COUNCIL... 4 WEB ADVISORY COMMITTEE (WAC)... 4 WEBMASTER... 4 ADMINISTRATION AND DEPARTMENT HEADS...
Acceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
WEB PAGE DEVELOPMENT Policy Code: 3227/7322
Consistent with board policy 3225/7320, Internet and the Educational Program, the board of education encourages the use of the Internet as a means of providing accessible, accurate and timely information
INTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP)
4510.2 INTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP) The Board of Education is committed to the optimization of student learning and teaching. The Board considers computers to be a valuable tool for
The Designer estimates reaching satisfactory completion of the Services within six weeks of the Effective Date.
Website Design Agreement 1. Description of the Services The Designer will design a website (the "Website") for the Owner by providing the design and programming services listed on Schedule A (the "Services")
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
Valdosta State University. Information Resources Acceptable Use Policy
Valdosta State University Information Resources Acceptable Use Policy Date: December 10, 2010 1. OVERVIEW... 3 2. SCOPE... 3 3. DESIGNATION OF REPRESENTATIVES... 3 3.1 UNIVERSITY PRESIDENT... 3 3.2 VICE
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
Policy Governing Computer Security and Resource Allocation
(In the text that follows, the policy is set in straight type; additional explanatory material is set in italics and is not to be considered part of the policy itself.) 1. Rationale In support of its mission
NIU Web Standards. August, 2015
NIU Web Standards August, 2015 Table of Contents Audience...3 Web Content Management System (CMS)...3 User Access...3 Training...3 Update Requests...4 Web Templates...4 Logos and Branding...4 NIU Brand
If you have any questions about any of our policies, please contact the Customer Services Team.
Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting
2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of
2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of San Diego computing and network resources. This policy
Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law
Terms and Conditions Acceptable Use Policy Introduction (hereafter called Hosted Developments) has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources, and the resources
A Systems Approach to HVAC Contractor Security
LLNL-JRNL-653695 A Systems Approach to HVAC Contractor Security K. M. Masica April 24, 2014 A Systems Approach to HVAC Contractor Security Disclaimer This document was prepared as an account of work sponsored
WEBSITE HOSTING SERVICES AGREEMENT. Effective Date: 1/1/2015
WEBSITE HOSTING SERVICES AGREEMENT Effective Date: 1/1/2015 1) Scope of Services. Company will provide Client a shared or dedicated virtual machine, an Internet address for storage and access to Content,
ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure
ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure MANUAL: Hospital Wide SECTION: Information Technology SUBJECT: Acceptable Use of Information Systems Policy IMPLEMENTATION: 01/2011 CONCURRENCE:
COMPUTER, NETWORK AND INTERNET USE POLICY
4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
EL CAMINO COLLEGE WEB SITE GUIDE
El Camino College Web Site [email protected] Heather Parnock, Publications Supervisor ext. 6518 [email protected] FALL 2008 Overview The El Camino College Web Site is published by the Public
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
Policies Governing Campus Filming and Photography
Policies Governing Campus Filming and Photography l. PURPOSE This policy is intended to clarify under what circumstances Filming and Photography on the Westminster College campus and its properties may
Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
MUSIC, VIDEO AND SOFTWARE PIRACY POLICY
Information Technology Services MUSIC, VIDEO AND SOFTWARE PIRACY POLICY Date approved: 17 March 2005 Date Policy will take effect: 17 March 2005 Date of Next Review: December 2010 Approved by: Custodian
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
Internet usage Policy
Internet usage Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
Virginia Commonwealth University Police Department
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
AGREEMENT FOR WEB DESIGN & DEVELOPMENT
AGREEMENT FOR WEB DESIGN & DEVELOPMENT 1. Authorization. The Client,, authorizes GeekArtist Web Solutions, LLC at 4314 Princeton Drive, Garland, TX 75042 (herein referred to as the The Company ) to develop
Acceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
TECHNOLOGY ACCEPTABLE USE POLICY
Policy Statement TECHNOLOGY ACCEPTABLE USE POLICY Reason for Policy/Purpose The purpose of this policy is to provide guidelines to the acceptable and ethical behavior that guides use of information and
Creating a Website with Publisher 2013
Creating a Website with Publisher 2013 University Information Technology Services Training, Outreach, Learning Technologies & Video Production Copyright 2015 KSU Division of University Information Technology
Consensus Policy Resource Community. Lab Security Policy
Lab Security Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
SLCC WEB PUBLISHING GUIDELINES AND PROCEDURES
SLCC WEB PUBLISHING GUIDELINES AND PROCEDURES The purpose of the Web Publishing Guidelines and Procedures document is to ensure consistency, compliance and provide standards and direction for the advancement
Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure
Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Introduction Tenable Network Security is the first and only solution to offer security visibility, Azure cloud environment auditing, system
Software License Monitoring
LANDESK Quick Start Guide Software License Monitoring VERSION 2 Introduction This guide was designed to help those users new to Software License Monitoring (SLM) introduced in LANDESK Management Suite
(Acceptable Use Policy or "AUP")
(Acceptable Use Policy or "AUP") By using our web hosting services and/or email listserv programs, you agree to comply with our acceptable usage policy. We expect you to possess a basic knowledge of the
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
Acceptable Use Policy
1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,
Photography Policy. Videography Policy
Photography Policy The Office of University Marketing provides photographic coverage limited to noteworthy events taking place on the Stetson University campus for use in marketing materials. Because of
Mobile App User's Guide
Mobile App User's Guide Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure
Salisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media
What is social media? Social media is defined as any form of online publication or presence that allows end users to engage in multidirectional conversations in or around the content on the website. (Online
Module 3 Licensed Software TABLE OF CONTENTS. Version 3.0
1 Module 3 Licensed Software Version 3.0 TABLE OF CONTENTS 1. AGREED TERMS AND INTERPRETATION... 2 2. LICENCE TERMS... 3 3. SUPPLY OF... 8 4. UPDATES AND NEW RELEASES... 9 5. OPEN SOURCE SOFTWARE... 10
APPROPRIATE USE OF DIGITAL COMMUNICATIONS AND TECHNOLOGIES POLICY
REGISTER OF POLICIES, PROCEDURES AND BY-LAWS APPROPRIATE USE OF DIGITAL COMMUNICATIONS AND TECHNOLOGIES POLICY Code: Policy 2.11 Date of Coming into Force: June 27, 2011 Number of Pages: 6 Origin: Education/
HallPass Instructions for Connecting to your Campus PC Using the ipad
University Information Technology Services Training, Outreach, Learning Technologies & Video Production HallPass Instructions for Connecting to your Campus PC Using the ipad The following explains how
ADA Jobs - Diagnosing the Essential Duties of an Alameda County Office
Alameda County Office of Education Job Description Disclaimer Job descriptions are written as a representative list of the ADA essential duties performed by the entire job classification. They are not
Acceptable Use Policy
Acceptable Use Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
Lumous standard terms and conditions web design and development
Lumous standard terms and conditions web design and development 1. DEFINITION OF TERMS Lumous Limited, 17 Rubens Close, Swindon, Wiltshire SN25 4GR, trading as Lumous Limited having its principal place
Infor Web UI Sizing and Deployment for a Thin Client Solution
Infor Web UI Sizing and Deployment for a Thin Client Solution Copyright 2012 Infor Important Notices The material contained in this publication (including any supplementary information) constitutes and
Understanding & Improving Hypervisor Security
The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1
TERMS AND CONDITIONS
TERMS AND CONDITIONS 1. Your Acceptance Welcome to the website operated by Joint Aid Management ( JAM ) International. By using or visiting this website, you signify your agreement to the terms and conditions
City of Cleveland Social Media Policy
City of Cleveland Social Media Policy Mayor s Office of Communications October 2012 City of Cleveland Social Media Policy and Guidelines for Public Use The City of Cleveland is participating in social
