University Technology
Technology-Related University Policies
-
Data Security and Handling Policy
Defines the right of the university to examine computer records or monitor computer activities and appropriate actions and measures that can be taken. -
Electronic Mail (Email) Policy
Clarifies proper use of University provided electronic mail (email). -
Information Security Program Policy
Establishes the Information Security Program at 91´«Ã½. -
Mobile & Remote Communication Policy
Guidelines, criteria and conditions of use of mobile/remote communication devices (mobile/remote telephones, email appliances, wireless PDAs, etc). -
Password Policy
Provides password guidance and requirements for university technology systems. -
Remote work guidelines for administrative professional and civil service appointments. -
Security Camera Policy
The purpose of this policy is to regulate the installation and appropriate use of security cameras on 91´«Ã½ property, along with the temporary storage and use of recorded images. -
States that users of university computing resources are responsible for ascertaining, understanding, and complying with the laws, rules, policies, contracts, and licenses applicable to their particular uses.Ìý -
Web Use, Accessibility and Privacy Policy
Defines university website usage, accessibility and privacy requirements.
Departmental Processes & Procedures
-
Administrative Information Management Systems (AIMS) Procedures
Processes for requesting labels, listings, Tele-STARS messages, or surveys from the AIMS unit.Ìý -
Computer Lab Reservation Procedures
Process for requesting a University Technology computer lab for faculty/classroom purposes. -
Computer Lab Software Installation Request Procedures
Process for requesting the installation of specialty software in University Technology computer labs. -
DCMA & HEOA Response Procedures
Actions that University Technology will take when unauthorized sharing of copyrighted material is detected on the university network. -
Information Security Program
Information on the implementation and enforcement of uTech's infosec program. -
Information Technology GovernanceÌý(IT Governance)Ìý
Process for submitting and evaluating technology enhancement ideas that affect the university community. -
Microsoft Update Process
Process of how and when Microsoft patches are installed on University computers. -
Secure Wireless ConfigurationÌý
Processes for configuring devices to connect to 91´«Ã½'s wireless network.

Connect with uTech: