Union College Campus Technology Policy Manual Campus Technology Committee



Similar documents
BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy

OHIO VALLEY EDUCATIONAL COOPERATIVE TECHNOLOGY ACCEPTABLE USE POLICY

Technology & Computer Lab Handbook

Information Technology User Policy 10/31/13

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY

The Internet and 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

How To Use Your Cell Phone At Renaissance Academy Charter School

INTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP)

COMPUTER USE POLICY. 1.0 Purpose and Summary

Human Resources Policy and Procedure Manual

CSG Windows Support Policy

K-20 Network Acceptable Use Guidelines/Internet Safety Requirements

Frisco ISD

Information Resources Security Guidelines

Warren Consolidated Schools Technology Acceptable Use & Internet Safety Guidelines

Student Affairs Information Technology Policies. January 2013

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014

Technology Department 1350 Main Street Cambria, CA 93428

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

Computer Services Service Level Agreement

Bates Technical College. Information Technology Acceptable Use Policy

Network Security Policy

Information Technology Policy

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

Monterey Peninsula College

Ethical and Responsible Use of EagleNet 03/26/14 AMW

Students Acceptable Use Policy for Electronic Resources Rules Summary

Odessa College Use of Computer Resources Policy Policy Date: November 2010

Information Technology Acceptable Use Policy

INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures

Appendix I. The City University of New York Policy on Acceptable Use of Computer Resources

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan ACCEPTABLE USE POLICY

HIPAA Security Training Manual

Franciscan University of Steubenville Information Security Policy

Responsible Use of Technology and Information Resources

Boston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy

Pierce County Policy on Computer Use and Information Systems

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

Lutheran Education Association of Houston Acceptable Use Policy (Students)

Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5

Dracut Public Schools Technology Acceptable Use Policy Revised 2014

Bring Your Own Device (BYOD) Policy Revised: April 2012

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Network and Workstation Acceptable Use Policy

Ventura College I.T. Services Level Agreement

Acceptable Use of ICT Policy. Staff Policy

Caldwell Community College and Technical Institute

GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut

Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy

North Clackamas School District 12

C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY

Hardware and Software

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY

Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement

Table of Contents General Policy for service provided by the CLAS Linux Support team... 2

COMPUTER NETWORK AND INTERNET ACCEPTABLE USE FOR STUDENTS AND STAFF

Haddon Township School District Acceptable Use of Information and Communication Technology for Students

Code of Virginia, 1950, as amended, Sections , :1, , , and

TYPE: INFORMATIONAL & INSTRUCTIONAL TECHNOLOGY. POLICY TITLE: Technology Use Policy

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

[Acceptable Use Policy]

Internet Acceptable Use Policy

III. RESPONSIBILITIES

INFORMATION TECHNOLOGY APPROPRIATE USE

1:1 COMPUTER PROGRAM LAPTOP POLICY

The Top Ten Of Public Computers And Their Perpetuation

TECHNOLOGY ACCEPTABLE USE POLICY

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

Draft Information Technology Policy

Use of ESF Computing and Network Resources

Acceptable Use Policy

5. Users of ITS are the persons described above under Policy Application of the diocese of Springfield in Illinois.

Information Technology Handbook

Introduction. General Use

City of Grand Rapids ADMINISTRATIVE POLICY

DESKTOP SUPPORT SERVICE LEVEL AGREEMENT

Acceptable Use Policy

Clear Creek ISD CQ (REGULATION) Business and Support Services: Electronic Communications

Student & Staff Access and Use of Networked Information Resources and Communications

Authorised Acceptable Use Policy Groby Community College Achieving Excellence Together

ScoMIS Encryption Service

Medina County Policy Manual

Electronic Communications System

Policy for the Acceptable Use of Information Technology Resources

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Nondiscrimination. 1 of 10

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version /03/2014

district Legal Networking

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE

Transcription:

Union College Campus Technology Policy Manual Campus Technology Committee (Approved by President s Council on December 19, 2013) Table of Contents Introduction... 2 Technology Decision-Making Tree... 3 Hardware Policy... 4 Software Policy... 4 Hardware Replacement Schedule Policy... 5 Disposal of Retired Hardware Policy... 5 Bring Your Own Device Policy... 6 Shared Equipment Policy... 6 Backup and Redundancy Policy... 7 Desktop & Laptop Computers... 7 Servers and Major Systems... 7 Adventist Educational Alliance... 7 Student Services Policy... 7 Guest Services Policy... 8 Support / Technology Help Desk... 9 Online (Cloud-based) Storage Service Policy... 10 Page 1

Introduction The purpose of the Campus Technology Manual is to establish uniform practices in the implementation of information technology across the Union College campus. The policy manual works in conjunction with the Union College Technology Plan. The following policies serve two main purposes: Communicate essential information about information technology practice including acquisition of new equipment, replacement of current equipment, and support for this equipment to faculty and staff. Guide Information Systems (IS) in the administration and deployment of information technology components. Any situation arising which is not covered by the following policies should be brought to the attention of the Campus Technology Committee (CTC) for review. CTC may approve projects within the allocated budget and which are determined to support the mission of Union College or deny projects which do not fit this criteria. CTC will recommend projects deemed valuable but for which funding is not yet available to President s Council. The decision-making tree on page 3 illustrates this process in more detail. The policy manual covers the acquisition, deployment, and support of information technology on campus. The director of Information Systems reports to the Vice-President for Finance and together they execute the assigned plans and policies in the Union College Technology Plan and the Campus Technology Policy Manual. Because of the broad scope of the campus-wide technology plans and policies, particular items may more appropriately be implemented by other departments or committees as determined by CTC. This policy manual is submitted to Faculty Senate, Staff Advisory, and Student Senate for comment and review prior to its submission to President s Council for final approval whenever substantive changes are made or new policies are written. The manual becomes effective upon approval by President s Council. Page 2

Technology Decision-Making Tree Page 3

Hardware Policy 1. Departments must consult with the Director of Information Systems when purchasing any hardware which connects to the network, telephone system, or computer systems. 2. An approved purchase order is required before orders for new hardware will be placed. 3. As much as possible hardware will be purchased from the same company(ies) in order to increase efficiency and effectiveness through interoperability. 4. Campus Technology Committee determines minimum hardware standards. 5. The standard computers Union College provides consist of a desktop computer and basic peripherals (monitor, keyboard, mouse, speakers or headphones, and access to a printer). Special needs, such as a large monitor, laptop computer, or individual printer, are considered on a case-by-case basis. 6. Existing hardware is updated according to the Replacement Schedule beginning on page 5. 7. In consultation with Information Systems, department directors may choose to have a computer scheduled for replacement reassigned to another position within the department as long as these conditions are met: a. The computer being reassigned is more functional than the one it will replace. b. The least functional computer is taken out of service. The reassignment of existing computers will not be concurrent with the installation of the new computer and will be completed as a low priority work order. 8. Standard technology purchases with a modest cost and funded by the requesting department may be made upon the approval of Information Systems, the Accounting Office (for purchases exceeding $100), and the requesting department. 9. Technologies new to Union College, large expenditures, or purchases that affect multiple computers or multiple departments must be approved by the Campus Technology Committee. Requests with merit and that are beyond the committee s scope (either financially or due to campus impact) will be recommended to President s Council. 10. All orders must be routed through Information Systems. Software Policy 1. New software (including updates and new versions) must be approved by Information Systems for compatibility before it is adopted. Compatibility will include such items as security, operating system, hardware, network environment, software mix, and so on. 2. Departments must obtain approval from the Director of Information Systems when purchasing any new or updated software. 3. An approved purchase order is required before orders for new software will be placed. Licenses for standard productivity applications (for example, Microsoft Office) must be purchased through Information Systems. 4. Each Union College computer is supplied with the software standard for the task in which it is employed. This usually includes Microsoft Office, Google Chrome and Internet Explorer, in addition to specialized applications needed in specific departments. Special needs are considered on a case-by-case basis. Page 4

5. Individuals requesting installation of software purchased by the department or individual employee must supply Information Systems with proof that it is a legal copy and that they have permission to install it. A copy of this proof will be kept on file in Information Systems. 6. Legacy software will be removed. 7. Standard software is updated to the college s current standard either when the hardware is replaced or when a need is identified by Information Systems, Campus Technology Committee, or the department using the software. 8. New software purchases with a modest cost and funded by the requesting department may be made upon the approval of Information Systems, the Accounting Office (for purchases exceeding $100), and the requesting department. 9. Software new to Union College, large purchases, or purchases that affect multiple computers or multiple departments must be approved by the Campus Technology Committee. Requests with merit and that are beyond the committee s scope (either financially or due to campus impact) will be recommended to President s Council. Hardware Replacement Schedule Policy It is Union College s goal to replace desktop and laptop computers assigned to employees and classrooms on a five-year rotating schedule. This means that some computers will be replaced each year. At no time will all employees have new computers at the same time, nor at any time should someone have a computer more than five years old. 1. Staff whose jobs do not otherwise require a computer may choose to share a computer with other employees in their department for access to campus communication. These limited use shared computers may be older than five years. 2. Other classroom technology (projectors, document cameras, and so on) will be reviewed on a regular basis for compliance with current standards set by Campus Technology Committee. Equipment which does not meet the standard will be replaced. 3. Basic peripherals (monitors, keyboards, mice, remote controls, etc.) will be replaced at end of life. 4. Computer labs will be updated every five years. No two labs should be replaced in the same year. 5. Replacement of special use computers with high specification needs will be the responsibility of the department which owns it. 6. Replacement of departmental printers is the financial responsibility of individual departments. 7. Computers with a limited, specific use, such as points of sale, time clocks, and slide show display systems will be replaced or upgraded as needed or determined by other campus policies or changes. 8. Network components have a life time warranty and are replaced as needed. Disposal of Retired Hardware Policy This policy provides for the disposal of hardware which Union College no longer wishes to use. Page 5

1. Retired hardware with remaining life will be sold, with proceeds reinvested in the campus technology plan. 2. Retired hardware with no remaining usefulness will be recycled. 3. Hardware retired by Union College and sold or given away may not be reinstalled on campus in any capacity. Bring Your Own Device Policy 1. Union College allows personal devices to connect to its Exchange server. 2. Personal devices can be configured to allow access to the computer issued to the employee by Union College via a secure connection with permission from the department supervisor. 3. Employee personal devices are allowed on the Employee network. 4. The Employee network allows access to the internet, including Union College's public services. 5. Student personal devices are allowed on the Student network. See Student Services Policy for terms of use. 6. Campus guests are allowed to use the Guest network. See Guest Services Policy for terms of use. Shared Equipment Policy Whenever possible, technology purchases should consider the needs of the campus as a whole. As new or replacement technology is requested by departments, Information Systems may recommend alternative purchases that would benefit the college at large in addition to meeting the department s needs. The college currently has shared equipment in the following functions: Color printing o Copy Center Computer labs o Microlab, third floor of the Dick Administration Building o Mac Lab, second floor of Engel Hall o Library, room 229 High volume copying and printing (folding, cutting, and binding also available) o Copy Center o AdventSource (not a part of Union College) Low volume printing o Network printers in department Fax machine o Information Systems o Library File share o Campus Intranet File Swap (X: drive) files erased daily at midnight Graphics and Desktop Publishing software o Mac Lab, second floor of Engel Hall Image scanning o Library o Marketing Communications Page 6

Laminating o Library Backup and Redundancy Policy By default desktop and laptop computers are not automatically backed up. In order to back up files, employees should save files to their personal account on the W: drive. Files on the W: drive reside on a server maintained and backed up by Information Systems. Files on the C: drive reside only on your local desktop or laptop computer and are not backed up by Information Systems. Desktop & Laptop Computers 1. Each employee is allotted 5GB for backup on the W: drive. Please contact Information Systems if this is insufficient. 2. For special projects with the need for large capacity, employees should consult Information Systems regarding the best alternative for backing up files. Servers and Major Systems 1. Data from the servers is backed up to tape on a daily basis and stored in a building separate from the servers. Weekly backup tapes are stored at an off campus site. Information Systems maintains backup tapes according to a more detailed internal departmental plan. 2. Most servers and switches are the same type and components are interoperable. 3. One complete hardware server is kept in reserve and used for testing. When there is a system failure, it is put into production and a new reserve/test system is purchased. The same is also done for switches. 4. In the event of a disaster, all new hardware would be purchased and data restored from backup tapes. Adventist Educational Alliance Union College is currently exploring collaborative opportunities with Southern Adventist University and Southwestern Adventist University. As components of the Union College technology program are studied, consideration will be given to the possible benefits of a collaborative partnership with the other two campuses. Student Services Policy Union College operates a private computer system/network with access granted to users for a very specific use. Users are expected to maintain a high level of computer conduct. It is not acceptable to: Login/access Union College systems using anything but your assigned username. Add, examine, copy, modify, or delete any files/data except to the areas assigned to you or to areas specifically indicated as public. Load/download any software on a Union College computer without proper permission. Waste any resource such as using excessive disk space, creating unnecessary processes, printing unneeded materials, sending junk e-mail, excessive internet use, etc. Page 7

Possess or use any software for the purpose of breaking security/passwords, snooping, monitoring any Union College computer/network. Attach a DHCP server to the Union College network. Enable a wireless access point including access points imbedded on other devices such as printers and routers. Knowingly attempt to distribute a virus, Trojan horse, monitoring software, etc. Modify or configure any Union College computer or network hardware/software. Violate any lab guidelines. Use language or engage in conduct inconsistent with Union s policies and standards. Use Union College computers/network to violate rules of non-union College computers/networks. Host services for connection from off campus. Harass, threaten, or otherwise cause harm to specific individuals. Engage in any activity that is illegal by local, state, or federal law. All infractions will be reported to the Vice-President for Student Services. Unacceptable conduct will result in disciplinary actions such as but not limited to: Temporary or permanent loss of computer privileges. Temporary or permanent suspension from college. Fees covering expenses incurred by the college. Involvement of local civil authorities. Guest Services Policy Union College offers complimentary wireless access to Ortner Center guests as well as other campus day visitors. Guests may access the wireless network by selecting UC_Guest from the list of networks available on their devices while on campus. The current password may be obtained from the Ortner Center Desk (402-486-2545) or the Union College Library (402-486-2514). Public desktop computers are also available in the Ortner Center Lobby and the Union College Library. Note that the Internet is unavailable on the Ortner Center Lobby computers between midnight and 6 a.m. The UC_Guest wireless network is filtered, blocking websites in the following categories: Academic fraud, alcohol, drugs, file storage, gambling, lingerie/bikini, P2P/file sharing, sexuality, tobacco, video sharing, adult themes, hate/discrimination, movies, parked domains, proxy/anonymizer, tasteless, adware, music, nudity, pornography, radio, typo squatting, and weapons. Union College reserves the right to add or remove categories from this list at any time. Union College operates a private computer system/network with access granted to specific users. Users are expected to maintain a high level of ethical information technology conduct. By logging on to the guest wireless network or using one of the public computer stations, visitors are consenting to comply with Union College s policy for computer usage. Page 8

1. Student computers are to be connected to the student network only. Students should not use the UC_Guest network. 2. Guests may only add, examine, copy, modify or delete any files/data in areas assigned to them or to areas specifically indicated as public. 3. Loading/downloading any software on a Union College computer without proper permission is prohibited. 4. Practice courteous behavior by not wasting any resource such as using excessive disk space, creating unnecessary processes, printing unneeded printer output, sending junk e-mail, excessive Internet use, etc. 5. Possession or use of any software for the purpose of breaking security/passwords, snooping, monitoring any computer/network is prohibited. 6. Knowingly attempting to distribute a virus, Trojan horse, monitoring software, etc. is prohibited. 7. Attaching a wireless access point or DHCP server is prohibited. 8. Modifying or configuring any Union College computer or network hardware/software is prohibited. 9. Use language or engage in conduct inconsistent with Union s policies and standards. 10. Using Union College computers/network to violate rules of non-union College computers/networks is prohibited. 11. Host services for connections from off campus. 12. Harassing, threatening or otherwise causing harm to specific individuals. 13. Engaging in any activity that is illegal by local, state or federal law, including copyright infringement. 14. Unacceptable conduct will result in temporary or permanent loss of computer/network privileges and may also include fees covering expenses incurred by the college and/or involvement of local civil authorities if necessary. Support / Technology Help Desk 1. IS will employ a web-based ticketing system for submission and tracking of user requests. 2. It is Information Systems goal to address problems with campus technology as quickly as possible. The priority levels listed below represent the maximum length of time it should take for an initial response to the problem and the problem should also be resolved within the same time frame if at all possible. If it is not possible to fix the problem this quickly, then the estimated completion time should be communicated to the requestor or others who need to know. a. Critical/Emergency: Priority 1 (15 minute response) Defined: Examples: Immediate impact upon instruction Classroom technology failure preventing the class from proceeding Critical service failure effecting academic services for one or more courses/student groups Page 9

b. Urgent/High: Priority 2 (1 hour response) Defined: Urgent, or high priority issues directly impacting instruction or academic services Examples: Classroom technology failure that must be addressed before the next class meeting Faculty/staff inability to access core services Faculty/staff computer is non-functional and preventing them from working c. Normal: Priority 3 (4 hour response) Defined: Day-to-day support issues of a non-urgent nature Examples: One or more applications will not function but an alternative exists Classroom technology problems that do not prevent the class from proceeding Issues of an inconvenient nature but not preventing day-to-day business operations d. Scheduled Needs: Priority 4 (1 day response) Defined: Requests for software, updates, hardware, or other equipment needed by a specific time Examples: A time is setup/appointment made for new or replacement equipment to be set up Computer OS or Software updates Equipment/phone moves and setup 3. Students who need assistance with personally owned computers will be referred to the Microlab, independent student consultants, or local tech support companies. 4. Faculty and staff who need assistance with personally owned computers will be referred to the Microlab, independent student consultants, or local tech support companies. 5. Undocumented hardware acquired by departments (equipment purchased without approval) will receive lowest priority for support. Online (Cloud-based) Storage Service Policy Union College employees may desire to use a cloud-based storage service that allows users to share files (photos, docs, videos, etc.) across multiple platforms, including computers, smart phones and the service s website. While there are some privacy and security concerns regarding cloud-based storage services, it is a useful and widely accepted tool. Employees desiring to use cloud-based storage should adhere to the following guidelines: 1. While many options for cloud-based storage exist, Dropbox (www.dropbox.com) is the only service maintained by Information Systems. Employees may request to have Dropbox software installed on their computers to facilitate ease of use. Other cloud-based storage services software will not be installed; however, employees may still choose to use one of them by logging into their accounts via the service s website. 2. Store only appropriate documents and data in cloud-based storage. Do not use cloud-based storage to store documents or files containing high-risk and sensitive institutional information. This includes any data subject to college privacy regulations; protected by state and federal laws Page 10

(such as FERPA, HIPAA, State Identity Theft Act, or Research and Export Regulations); under contractual provisions (such as PCI DSS, social security number, etc.); or whose release could cause financial or reputational harm to the college or to individual students or employees. 3. Do not share cloud-based storage accounts containing work-related data with other members of your household, family or friends. If you have installed cloud-based storage software on your personal computer, carefully monitor this account access point to make sure other people who may use your computer are not misusing your account, either intentionally or unintentionally. Misuse includes both unauthorized viewing or editing of work-related data and syncing significant amounts of personal data with Union College computers. 4. Use shared folders with discretion. When other members of the shared folder add content, this additional data may automatically sync with your work computer. 5. To reduce risk of transferring viruses to Union College computers and network, please ensure that your personal computer s virus-protection software is up-to-date and operating. 6. Cloud-based storage is a tool of convenience. It should not be used as the sole repository for course syllabi, works for hire, or other documents which have enduring significance (legal or historical) for Union College and which should ultimately reside in institutional archives. This includes all files which Union College needs to retain in the event of an employee s departure. 7. The terms of service for Dropbox (or other cloud-based storage) are between you, the account owner, and Dropbox. The terms and conditions in the click-through Dropbox personal license have not been approved by Union College for college use. What You Should Know Before Using Dropbox 1. When Dropbox is installed on your work computer, it interacts with the Union College network. To ensure proper functioning, please ask Information Systems to install the software for you rather than attempting to do it yourself. 2. On your personal devices, download Dropbox (or other cloud-based applications) only from reputable software publishers to safeguard access to your information. Independent app developers can, via their apps, access any data available to your cloud-based service on your device and send it anywhere for any purpose via your Internet connection. 3. Limit automatic syncing of files between Dropbox, your work computer or mobile device, and your home computer or mobile device to specific work-related files and folders. As personal data unrelated to your job should not be stored on your work computer, restricting which folders automatically sync can help reduce the chance of unintended copying of personal data to Union College computers. 4. Safeguard access to your Dropbox control files - particularly your Dropbox configuration database file (named.../dropbox/config.db), which contains your Dropbox login credentials. Do not allow others to copy this file. Anyone with this information on their computer can impersonate you and access any data you send via Dropbox. You will not be able to change or remove their access to your information by using your computer! 5. Dropbox globally encrypts your data both at rest on its servers and in transmission. Any folder you share with specific people or devices is decrypted by Dropbox to allow access to the files Page 11

you have shared. Dropbox, however, provides a single security key to encrypt all of its customers data. Therefore, your shared files on Dropbox or your shared devices may need additional protection from hackers or others seeking to obtain information without your awareness. It is advisable to avoid storing on Dropbox any documents which would be harmful or embarrassing if made public. This includes any private or sensitive personal data (such as your tax return, driver s license number, etc.). Page 12