IT EQUIPMENT POLICY REPLACEMENT CYCLE
|
|
- Milo Tucker
- 5 years ago
- Views:
Transcription
1 IT EQUIPMENT POLICY REPLACEMENT CYCLE It is an objective of the Hibbing Community College (HCC) Information Technology department to regularly replace aging computer equipment with more modern items as time and money permit. The HCC Technology Plan dictates the rotation cycle of computers in our labs and offices. Please refer to that document when considering the replacement cycle of HCC systems. The goals of replacing systems at HCC are as follows: Ensure that the quality and standards of equipment in our labs is sufficient to meet or exceed Hibbing Community College s Mission Statement. Ensure that each faculty member, staff member, or student has the computing resources at their disposal to fulfill their responsibilities. Ensure that minimum state standards are met. Ensure cost effective installation and maintenance of systems. Ensure cost effective disposal of old equipment. Computer hardware is generally replaced during the summer semester as this usually results in the least amount of disruption to Faculty, Staff and Students at HCC. This of course is not always the case, as hardware replacement occurs year round and is usually done while accommodating the requests of Faculty and Staff. Faculty and Staff are PROHIBITED from purchasing their own hardware or software without first contacting the Information Technology department. This is only to ensure quality and performance on the HCC network. This is also to prevent someone from purchasing incompatible hardware. Faculty and Staff interested in replacing their office computer should first discuss the option with their department head, which can make the request to Information Technology. Generally some discussion will take place regarding the financial aspect of the purchase (e.g. Perkins Fund) depending on the role of the PC.
2 COMPUTERS ON LOAN Computers are very useful to Faculty while on sabbatical, on vacation, or out of the office. Hibbing Community College permits Faculty and Staff to use HCC equipment and accounts during these periods. The Information Technology department offers a wide variety of computers and peripherals for loan. Faculty and Staff are eligible to borrow laptops for an extended period of time provided that the resources are available. All laptops come with a standard installation of software. Faculty and Staff are PROHIBITED from installing their own software on HCC systems, even when they are taken home, with the exception of installing and setting up software for connecting to an ISP. Hibbing Community College does NOT provide dial in service to Faculty, Staff, or Students for Internet access. You must arrange your own Internet Service with a 3 rd party. Hibbing Community College will NOT reimburse your costs for this Internet access. Information Technology is NOT obliged to assist Faculty or Staff in connecting HCC hardware to home networks or other ISPs. Faculty and Staff should seek support for ISP issues from their own ISP support people. Special requests can be made to Information Technology for special software or hardware needs on these systems. Computers on loan from the college are for OFFICIAL college use ONLY. They are NOT to be used by family members or friends under any circumstances. When the computer is returned, The Information Technology department reserves the right to scrub the hard disk of any data and reinstall all of the standard software. Faculty and Staff are responsible for any data they leave on the laptop when it is returned to the Faculty Lab. Information Technology reserves the right to recall all equipment out on loan in order to perform upgrades to software, and/or hardware replacement/upgrades at any time. GRANT FUNDED PURCHASES AND EQUIPMENT Faculty and Staff members pursuing grants or funding from grants for computing equipment must first speak with their Department Heads and the Network Administrator before attempting to go further in the purchasing process.
3 Computer equipment purchased under a grant will fall under the umbrella of Information Technology equipment as long as that equipment remains at the college. This equipment will also be subject to replacement within the Replacement Cycle. When the equipment is ready to be disposed of, the Information Technology department will communicate with the department head to facilitate the disposal of said equipment. There is often ownership issues with equipment purchased under grants, and these concerns must be addressed before disposal. PRINTERS The Information Technology department offers a wide variety of networked printers for Faculty, Staff, and Student use in several central locations. Individual desktop printers are permitted at HCC, and will be supported by the Information Technology department with the caveat that the Information Technology department is not responsible for the initial purchase of neither that printer, nor the ink for the printer, and is not obligated in any way to replace the printer after the warranty expires. Information Technology will assist you in replacing your desktop printer if it is still under warranty. While Information Technology does not aggressively support the purchase of desktop printers, it will assist you in the purchase of one, after discussing it with the department head. NETWORK EQUIPMENT Faculty, Staff, and Students are PROHIBITED from purchasing their own network equipment including, but not limited to, LAN cards, Wireless Cards, Routers, Hubs, Switches, Network Cabling, and network ready Printers. Network stability is paramount in our environment, and the addition of unauthorized network gear to the campus network can potentially result in hard to diagnose problems. Requests for this type of hardware must be directed to the Information Technology department. UPGRADES TO HARDWARE The Information Technology department will handle all upgrades to hardware, including upgrades to the firmware installed on a hardware device. This process can often result in a non functioning system if done improperly, causing further budget drains. An unauthorized employee who performs these types of upgrades risks having the costs incurred to them under the Responsibility for Equipment section.
4 Information Technology will meet with the employee and department head prior to upgrading hardware in order to ensure that the new equipment will meet current and anticipated computing needs. Hardware that is no longer necessary after the upgrades will enter the Replacement Cycle for disposal or recycling. RESPONSIBILITY FOR EQUIPMENT Each employee is directly responsible for taking reasonable care and safety precautions in regard to the Hibbing Community College owned computing equipment. Employees will be held responsible for damage to such equipment arising out of their personal negligence or intentional misconduct. Employees may inquire about proper care procedures with the Instruction Technology staff. HARDWARE BELONGING TO COLLEGE AFFILIATES Computing Hardware not owned by Hibbing Community College but owned by an affiliate of the college (e.g. UMD Dental) fall under the control of the Information Technology department. Information Technology reserves all the same rights and privileges to those systems as it does for its own systems. Information Technology will consult with each affiliate in regards to Hardware and Software upgrades, and will provide advice on the purchase of such upgrades. Information Technology will also perform the upgrades in cooperation with the affiliate in order to minimize disruption to normal college activities. PERSONALLY OWNED HARDWARE Faculty and Staff are PROHIBITED from using personally owned computer hardware and/or software at Hibbing Community College for official work. OTHER HARDWARE Information Technology will not upgrade equipment not owned by Hibbing Community College or one of its affiliates.
5 POLICY CHANGES AND REVIEW This policy is subject to change without notice. The campus Data Security Officer reserves the right to make exceptions, substitutions, or alterations to this policy on a case by case basis. Information Technology will review this policy annually. Changes and/or special requests pertaining to this policy should be directed to the campus Data Security Officer.
PURPOSE The purpose is to establish policy regarding university computers. The goals of the policy are to:
Information Resources Division COMPUTER PURCHASE AND REPLACEMENT POLICY Effective Date: June 1, 2016 Contact: Lisa Bazley, VP for Information Resources PURPOSE The purpose is to establish policy regarding
More informationWHEATON COLLEGE RETENTION POLICY May 16, 2013
WHEATON COLLEGE E-MAIL RETENTION POLICY May 16, 2013 I. PURPOSE Electronic mail (e-mail) has become a ubiquitous service that greatly enhances communication, both internally within the Wheaton community
More informationIDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) ITS Responsible Use of Telephone, Telecommunications, and Networking Resources ISUPP 2280
IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) ITS Responsible Use of Telephone, Telecommunications, and Networking Resources ISUPP 2280 POLICY INFORMATION Policy Section: Information Technology
More informationComputer Use and File Sharing Policy
Computer Use and File Sharing Policy Williamson College recognizes the value of computer and other electronic resources to improve student learning and enhance the administration and operation of its school.
More informationI. Policy Statement. University Provided Mobile Device Eligibility Policy Effective Date: October 12, 2018
University Provided Mobile Device Eligibility Policy Effective Date: October 12, 2018 I. Policy Statement This policy pertains to University employees whose job responsibilities are facilitated by the
More informationWELLSBORO AREA SCHOOL DISTRICT
No. 815.2 SECTION: OPERATIONS WELLSBORO AREA SCHOOL DISTRICT TITLE: DISTRICT-ISSUED LAPTOPS: STUDENT USE, RIGHTS, AND RESPONSIBILITIES ADOPTED: April 14, 2015 REVISED: October 7, 2015 815.2. DISTRICT-ISSUED
More informationUNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017
UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets
More informationDate of Next Review: May Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act
Date Approved: January 27, 2010-Board Date of Next Review: May 2023 Dates of Amendments: May 17, 2018 Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act
More informationFaculty and Staff, Student Labs Program Update. Information Technology Fiscal Year 2013
Faculty and Staff, Student Labs Program Update Information Technology Fiscal Year 2013 Standardize make/models/configurations of desktop and laptops used on the UMass Lowell campus. Standardize UMass Lowell
More informationInformation technology security and system integrity policy.
3359-11-10.3 Information technology security and system integrity policy. (A) Need for security and integrity. The university abides by and honors its long history of supporting the diverse academic values
More informationSYLLABUS. CODE: NETW 243 TITLE: Computer Repair & Maintenance. DIVISION: Business and Technology DEPARTMENT: Engineering & Technology
CODE: NETW 243 TITLE: Computer Repair & Maintenance DIVISION: Business and Technology DEPARTMENT: Engineering & Technology COURSE DESCRIPTION: This course provides students with the knowledge and skills
More informationUNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017
UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets
More informationWIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES
Intermediate School District #917 WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES Procedures Manual April 2009 Table of Contents Overview 3 Definitions 3 General Guidelines 4 Eligibility Requirements 5
More informationTechnology Solutions Center Policies and Procedures
Technology Solutions Center Policies and Procedures Revised 9/28/15 The School's Technology Solutions Center (TSC) is your point of contact for requesting technology consultation and support concerning
More informationClient Computing Security Standard (CCSS)
Client Computing Security Standard (CCSS) 1. Background The purpose of the Client Computing Security Standard (CCSS) is to (a) help protect each user s device from harm, (b) to protect other users devices
More informationMOTT COMMUNITY COLLEGE. Procedure for Cellular Telephones
MOTT COMMUNITY COLLEGE Procedure for Cellular Telephones September 2012 Cellular Telephones Procedures Manual TABLE OF CONTENTS Page No. 1. Overview 3 2. Applicable Board Policy 3 3. IRS 85/15 Rule 3 4.
More informationUniversity Network Policies
BACKGROUND Washington State University s network infrastructure and network services are vital to carry out the mission of the University. Policies are needed to ensure the continued integrity of these
More informationCELL PHONE POLICY Page 1 of 5 City of Manteca Administrative Policy and Procedure
CELL PHONE POLICY Page 1 of 5 Section 1: Purpose The City of Manteca recognizes that cellular telephones enhance the level of City services by allowing employees to remain in contact with the office or
More informationMobile Communication Devices. 1.0 Purpose. 2.0 Policy NO Virginia Polytechnic Institute and State University
Mobile Communication Devices NO. 3960 Policy Effective Date: 3/8/2016 Last Revision Date: Policy Owner: Dwight Shelton Policy Author: (Contact Person) Savita Sharma Affected Parties: Faculty Staff 1.0
More informationKSU Policy Category: Information Technology Page 1 of 5
KSU Policy Category: Information Technology Page 1 of 5 Policy Title Cellular, Wireless Communications Devices, and Services Policy Issue Date January 1, 2017 Effective Date January 17, 2019 Last Updated
More informationPENN MANOR SCHOOL DISTRICT
No. 815.2 SECTION: OPERATIONS PENN MANOR SCHOOL DISTRICT TITLE: DISTRICT-ISSUED LAPTOPS: STUDENT USE, RIGHTS, AND RESPONSIBILITIES ADOPTED: August 19, 2013 REVISED: April 20, 2015 815.2. DISTRICT-ISSUED
More informationA. Facilities and critical systems employees subject to afterhours call out.
ADMINISTRATIVE PROCEDURE 6450: Mobile Communication Devices and Cellular Phones Purpose To establish procedures for the assignment of an allowance for cellular telephones and other wireless, handheld mobile
More informationKlein ISD Tablet PC Handbook
Parent / Student Agreement Form I have received a copy of the Tablet PC Handbook. I understand and will comply with all of the conditions outlined within. Please initial one of the following options: I
More informationAnnals of Mathematics Electronic License Agreement
Annals of Mathematics Electronic License Agreement Annals of Mathematics, Fine Hall-Washington Road, Princeton University, Princeton, NJ 08544-1000, USA. Fax: 1-609-258-1367 Phone: 1-609-258-4191. By this
More informationPolicy on the Provision of Mobile Phones
Provision of Mobile Phones Policy on the Provision of Mobile Phones Originator name: Section / Dept: Implementation date: Date of next review: Related policies: Policy history: Roger Stickland Approval
More informationLawrenceburg Community Schools Technology Laptop USE AGREEMENT
Lawrenceburg Community Schools Technology Laptop USE AGREEMENT Please read this entire section carefully. This agreement is made effective upon receipt of a laptop, between The Lawrenceburg Community School
More informationYou are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person.
Middlesex Bank Person to Person Service You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person. This Agreement
More informationCanadian Anti-Spam Legislation (CASL)
Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS The purpose of this document is to assist and guide U of R employees regarding their obligations under the Canadian Anti-Spam Legislation
More informationWireless Communication Device Use Policy
Wireless Communication Device Use Policy Introduction The Wireless Communication Device Policy exists to provide guidance to employees regarding the acquisition and use of William Paterson University provided
More informationPOLICY 8200 NETWORK SECURITY
POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:
More informationTIER Program Funding Memorandum of Understanding For UCLA School of
TIER Program Funding Memorandum of Understanding For UCLA School of This Memorandum of Understanding is made between the Office of Information Technology (OIT) and the School of ( Department ) with reference
More informationSHARED SERVICES - INFORMATION TECHNOLOGY
Updated: February, 00 EB-00-0 Exhibit D Page of SHARED SERVICES - INFORMATION TECHNOLOGY.0 INTRODUCTION 0 Information Technology ( IT ) refers to computer systems (hardware, software and applications)
More informationUse of Mobile Devices on Voice and Data Networks Policy
World Agroforestry Centre Policy Series MG/C/4/2012 Use of Mobile Devices on Voice and Data Networks Policy One of the policies on information security and business continuity which will be audited by
More information!IlflimTIII~III~III~l~I~IIII!
This document is made available electronically by the Minnesota Legislative Reference Library as part of an ongoing digital archiving project. http://www.leg.state.mn.us/lrl/lrl.asp 12-0429!IlflimTIII~III~III~l~I~IIII!
More informationGuidelines for Faculty Participation in SBIR and STTR
Guidelines for Faculty Participation in SBIR and STTR Background Washington University (WU) is committed to the enhancement and support of faculty efforts to translate the results of their research to
More informationThis regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus.
UAR NUMBER: 400.01 TITLE: Wireless Network Policy and Procedure INITIAL ADOPTION: 11/6/2003 REVISION DATES: PURPOSE: Set forth the policy for using wireless data technologies and assigns responsibilities
More informationUniversity of Wyoming Mobile Communication Device Policy Effective January 1, 2013
University of Wyoming Mobile Communication Device Policy Effective January 1, 2013 Introduction and Purpose This policy allows the University to meet Internal Revenue Service (IRS) regulations and its
More informationSan Jac ITS Desktop Support Guidelines
San Jac ITS Desktop Support Guidelines Our goal at (ITS) is to provide the highest level of technical support and customer service to all San Jacinto College students and employees. We are constantly striving
More informationUniversity Facilities Management (UFM) Access Control Procedure (non-residence areas)
University Facilities Management (UFM) Access Control Procedure (non-residence areas) Date of Issue: October 1, 2015 A. PURPOSE University Facilities Management s (UFM) Lock Shop Access Control Procedure
More informationMoney back guarantee and refund policy
Billing By the Account Activation Date of each month, we shall deliver, via e-mail or post, an invoice in accordance with the applicable Service Fees for services to be rendered in the forthcoming month.
More informationFIREFLY SEND MONEY TERMS & CONDITIONS
E-SIGNATURE AND ELECTRONIC DISCLOSURES AGREEMENT FIREFLY SEND MONEY TERMS & CONDITIONS You are signing up to use the Firefly Credit Union ( Credit Union ) P2P service powered by Acculynk that allows you
More informationSubject: Wireless Networking Policy Effective Date: May 2005 Responsible Office: Department of Information Technology _ Responsible Officer:
Section Number Section Header: Subject: Wireless Networking Policy Effective Date: May 2005 Responsible Office: Department of Information Technology _ Responsible Officer: TABLE OF CONTENTS Introduction...1
More informationDEPARTMENT OF THE NAVY UNITED STATES NAVAL ACADEMY 121 BLAKE ROAD ANNAPOLIS MARYLAND
DEPARTMENT OF THE NAVY UNITED STATES NAVAL ACADEMY 121 BLAKE ROAD ANNAPOLIS MARYLAND 21402-1300 USNAINST 851 0.02A 28/ITSD USNA INSTRUCTION 851 0.02A From: Superintendent, U.S. Naval Academy Subj: GOVERNMENT-ISSUED
More informationGuidelines for the use of the IT infrastructure at the University of Bayreuth 10 February 2005
IT Guidelines Guidelines for the use of the IT infrastructure at the University of Bayreuth 10 February 2005 In accordance with Article 32 para 3 sentence 1 of the Bavarian Higher Education Act (Bayerisches
More informationTerms and Conditions - Dedicated Internet Access Service
Terms and Conditions - Dedicated Internet Access Service 1. Description of Service: Dedicated Internet Access ( DIA ) Service ( Service ), which includes T1, DS-3, Ethernet, Fast Ethernet, Gigabit Ethernet
More informationPOLICIES AND PROCEDURES
Integrated Information Technology Services POLICIES AND PROCEDURES Utica College Email POLICY: Email is Utica College s sole accepted mechanism for official electronic communication in the normal conduct
More informationManaged NIDS Care Services
Managed NIDS Care Services This Service Guide ( SG ) sets forth a description of CenturyLink Managed NIDS Care Service ( Service ) offerings including technical details and additional requirements or terms,
More informationIdentity Theft Prevention Policy
Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening
More informationCOMPUTER REQUIREMENTS
COMPUTER REQUIREMENTS Interior Design Program 2018-2019 The Interior Design Program is proud to make use of the latest technology to more fully prepare students for the professional design world. In order
More informationWIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES
Goodhue County Education District #6051 WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES Procedures Manual Updated January 2016 Table of Contents Overview 3 Definitions 3 General Guidelines 4 Eligibility
More informationThe University of British Columbia Board of Governors
The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:
More informationTERMS & CONDITIONS. Complied with GDPR rules and regulation CONDITIONS OF USE PROPRIETARY RIGHTS AND ACCEPTABLE USE OF CONTENT
TERMS & CONDITIONS www.karnevalkings.com (the "Site") is a website and online service owned and operated by the ViisTek Media group of companies (collectively known as "Karnevalkings.com", "we," "group",
More informationE- SIGNATURE AND ELECTRONIC DISCLOSURES AGREEMENT. Agreement to Conduct Transactions by Electronic Means
CREDIT UNION Version Terms and Conditions Gulf Winds Federal Credit Union P2P Service E- SIGNATURE AND ELECTRONIC DISCLOSURES AGREEMENT You are signing up to use the Gulf Winds Federal Credit Union ( Credit
More informationInformation Technology Standards
Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this
More informationQUESTIONS AND ANSWERS PROJECT NO Supply and Install Student System. Houston Community College System, Procurement Operations
QUESTIONS AND ANSWERS PROJECT NO. 06-22 Supply and Install Student Email System Date: March 21, 2006 To: From: All Prospective Respondents Houston Community College System, Procurement Operations Subject:
More informationCOURSE OUTLINE. School of Engineering Technology and Applied Science. Information and Communication Engineering Technology (ICET)
COURSE OUTLINE SCHOOL: School of Engineering Technology and Applied Science DEPARTMENT: Information and Communication Engineering Technology (ICET) PROGRAM: Computer Systems and Networks Technician/ Technology
More informationNon Profit. For Profitt. Other: Address: Administrative $500 $700 $ 1,000. Technology
SLAS Support Request Form SLAS is a global organization that exists to provide forums forr education and information exchange to encouragee study and advance laboratory sciencee and technology for the
More informationSecurity Awareness, Training, And Education Plan
Security Awareness, Training, And Education Plan Version 2.0 December 2016 TABLE OF CONTENTS 1.1 SCOPE 2 1.2 PRINCIPLES 2 1.3 REVISIONS 3 2.1 OBJECTIVE 4 3.1 PLAN DETAILS 4 3.2 WORKFORCE DESIGNATION 4
More informationMaster Student IT Guidebook. Step by Step Guide to IT Success in Zayed University
Master Student IT Guidebook Step by Step Guide to IT Success in Zayed University Contents Computing Services in Zayed University... 4 Configure Network Connection... 6 Window 7... 6 Mac... 14 ZU Network
More informationSYLLABUS. Departmental Syllabus. CompTIA A+ Practical Applications. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus
SYLLABUS DATE OF LAST REVIEW: 12/5/2014 CIP CODE: 11.1006 SEMESTER: COURSE TITLE: COURSE NUMBER: CompTIA A+ Practical Applications CRTE0101 CREDIT HOURS: 3 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE:
More informationGulf College Oman Tel.: / Fax: Web Site:
Gulf College Oman Tel.: 24468666/ Fax: 24468666 Email: gulfclge@omantel.net.om Web Site: www.gulfcollege.edu.om INTRODUCTION IET Centre staff are responsible for supervising and following up college labs.
More informationTerms and Conditions P2P Service E-Signature and Electronic Disclosures Agreement
You are signing up to use the P2P service powered by Acculynk ( Service ) that allows you to send funds to another person. This ( E-Sign Agreement ) applies to all communications, documents, disclosures
More informationICT-Guideline. Contents. Computer Science Steering group
CATHOLIC UNIVERSITY OF LEUVEN FACULTY OF THEOLOGY AND RELIGIOUS STUDIES SINT- MICHIELSSTRAAT 4 BOX 3100 3000 LEUVEN, BELGIUM LEUVEN Computer Science Steering group 2014-12-09 ICT-Guideline In addition
More informationCanadian Anti Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS
Canadian Anti Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS Note: This FAQ is intended to assist OC staff and faculty members to understand their obligations under the CASL. It summarizes and simplifies
More informationPolicies & Regulations
Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major
More informationFIRST BANK P2P Service Cent Terms and Conditions (Available via online or mobile banking)
FIRST BANK P2P Service Cent Terms and Conditions (Available via online or mobile banking) You are signing up to use the FIRST BANK ( Bank ) P2P service (called cent ) powered by Acculynk that allows you
More informationAccelerated Technology Refresh Project (ATRP) at VCH and PHC. Frequently Asked Questions
Accelerated Technology Refresh Project (ATRP) at VCH and PHC Frequently Asked Questions About the Desktop Transformation Program What is the Accelerated Technology Refresh Project? What are the costs to
More informationII.C.4. Policy: Southeastern Technical College Computer Use
II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer
More information<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Allowed Personally Owned Device Policy Every 2 years or as needed Purpose: A personally owned information system or device
More informationELIZABETH CITY STATE UNIVERSITY Web Page Policy
Adopted: 06/14/05 ELIZABETH CITY STATE UNIVERSITY Web Page Policy 1. Purpose of Policy The World Wide Web allows Elizabeth City State University staff, faculty, and students to promote university educational
More information1. Federation Participant Information DRAFT
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES [NOTE: This document should be considered a as MIT is still in the process of spinning up its participation in InCommon.] Participation in InCommon
More informationSubject: University Information Technology Resource Security Policy: OUTDATED
Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from
More informationInstruction Manual for: Creating a Profile Posting an Opportunity Posting a Classroom Grant Request
Instruction Manual for: Creating a Profile Posting an Opportunity Posting a Classroom Grant Request CREATING YOUR PROFILE Page 2 Please go to our website: www.getonthebuscollier.org and at the top left
More informationNEOMED OPERATIONAL POLICY
(A) PURPOSE Mobile computers allow NEOUCOM faculty and staff to have computing resources at hand in meetings/classes, enable those who travel on University business to be maximally functional and productive
More informationIntroduction: UNCC COE MOSAIC Page 1 of 9
Introduction: UNCC College Of Engineering Management Process of Application Software on the Mosaic System Oct 12,2005 Oct 20,2005 Oct 26,2005 Nov 14,2005 Jan 1,2007 Sept 19,2007 Version 1.2 This document
More informationAMS Electronic Journals License Agreement
Sales & Member Services Department cust-serv@ams.org 401.455.4000 401.455.4046 (f) www.ams.org AMS Electronic Journals License Agreement By this Agreement, the American Mathematical Society (AMS) grants
More informationEach member of the St. Margaret s Community has the privilege to access Google Apps provided by the school s network
NETWORK APPROPRIATE USE AGREEMENT 2018-2019 We are pleased to offer students of St. Margaret s School access to our computer network for electronic mail and the Internet. To gain access to e-mail and the
More informationEmployee Security Awareness Training Program
Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,
More informationFaculty and Staff Instruction Guide
Faculty and Staff Instruction Guide Welcome to our new online parking program. This instruction guide will hopefully help you in registering for a new parking permit making this process simple and easy.
More informationCellphone Provision Policy
Cellphone Provision Policy Responsible Official: David Clark, Associate Vice President, Campus Life Administering Division/Department: CL Finance Service Center Effective Date: September 1, 2018 Last Revision:
More informationUNIVERSITY CONTROLLER OFFICE STANDARD OPERATING PROCEDURES
UNIVERSITY CONTROLLER OFFICE STANDARD OPERATING PROCEDURES ACCOUNTING FOR EDUCATIONAL OPPORTUNITY FUND March 15, 2019 Table of Contents 1. Overview of Educational Opportunity Fund 2. Purpose of EOF Procedure
More informationAcquisition & Use of University Supplied Mobile Devices Policy
Acquisition & Use of University Supplied Mobile Devices Policy 1. Introduction 2. Device Definitions 3. Principles of the Policy 4. Eligibility 5. Tariffs & Hardware 6. Administration of Mobile Contracts
More informationCell Phones PROCEDURE. Procedure Section: Business and Administrative Matters - Purchasing 607-A. Respectfully submitted by:
Matters - Purchasing PROCEDURE Effective: October 13, 2015 Respectfully submitted by: Kathleen O Flaherty, Assistant Superintendent of Business 1. Authorization Individuals may be authorized to receive
More informationExam Proctoring Procedure Policy Number: Applies to: students, faculty, staff
Exam Proctoring Procedure Policy Number: 02-70-050 Applies to: students, faculty, staff 1. Policy Statement. The purpose of this policy is to ensure that academic integrity in the completion of exams is
More informationDraft. Policies of Colorado State University University Policy. Category: Information Technology
Policies of Colorado State University University Policy Policy Title: Acceptable Use for Computing and Networking Resources Category: Information Technology Owner: Vice President for Information Technology
More informationCell Phone Policy. 1. Purpose: Establish a policy for cell phone use and compensation allowance.
Cell Phone Policy 1. Purpose: Establish a policy for cell phone use and compensation allowance. 2. Authority: The Clinton County Board of Commissioners. 3. Application: This Cell Phone Policy (the Policy)
More informationINFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ
INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ JYVÄSKYLÄN YLIOPISTO Introduction With the principles described in this document, the management of the University of Jyväskylä further specifies
More informationConnecting Students, Faculty, and Staff with a New
Spring 2014 In this issue: Learning Management System Bomgar Remote Support IT Strategic Plan Feedback Computational Research Student Employees Add Your Email Profile Picture SkyDrive is Now OneDrive Email
More informationXO SITE SECURITY SERVICES
XO SITE SECURITY SERVICES 1.0 Product and Services 1.1 Product Description. XO Site Security (the "Service") is a managed security service which uses Premises-based, multi-threat sensing Customer Premises
More informationComputer Hardware and Software Standards for OSU Extension
Computer Hardware and Software Standards for OSU Extension Sections 1. Executive Summary 2. Criteria for Establishing Standards 3. Computers a. Primary Choices for Highest Level of Support b. Secondary
More informationPROGRESS REPORT of TECHNOLOGY PLAN 2016 INITIATIVES AS OF FEBRUARY 28, 2013
PROGRESS REPORT of TECHNOLOGY PLAN 2016 INITIATIVES AS OF FEBRUARY 28, 2013 The Tier 1 Initiatives were tied to Strategic Plan 2013 and the Program Review & Planning process. They offered desirable benefits
More informationPerson to Person (P2P) Services Terms and Conditions
Person to Person (P2P) Services Terms and Conditions These Terms of Use set forth the terms and conditions under which the Service is offered. The Service allows a Sender to transfer funds to a Recipient
More informationSYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus
SYLLABUS DATE OF LAST REVIEW: 02/2013 CIP CODE: 11.0901 SEMESTER: COURSE TITLE: Operating System Security (Windows 2008 Server) COURSE NUMBER: CIST-0254 CREDIT HOURS: 4 INSTRUCTOR: OFFICE LOCATION: OFFICE
More informationStaff Members. Penland Building, Suite 236. Ernest Pringle Vice Chancellor for Information Technology & CIO
Staff Members Penland Building, Suite 236 Ernest Pringle 641-3345 ernestp@usca.edu Vice Chancellor for Information Technology & CIO Linda Cox 641-3355 lindac@usca.edu Business Manager Miriam Zeidan 0 /
More informationInformation technology statement of directions
Calhoun: The NPS Institutional Archive Information Technology and Communication Services (ITACS) ITACS Publications 1998-04-13 Information technology statement of directions Information Technology and
More informationIT Remote Working Policy
IT Remote Working Policy 1. Purpose To ensure that all staff processing information remotely (i.e. not at a PC on campus) do so securely and in accordance with the Data Protection Act 1998. This policy
More informationINFORMATION RESOURCE SECURITY CONFIGURATION AND MANAGEMENT
INFORMATION RESOURCE SECURITY CONFIGURATION AND MANAGEMENT Policy UT Health San Antonio shall adopt and document Standards and Procedures to define and manage a secured operating configuration for all
More informationBRING YOUR OWN DEVICE PROGRAM
BRING YOUR OWN DEVICE PROGRAM Created: August 2015 Updated: August 2015 Printed: 12/8/2015 Page 1 of 7 CRICOS Code 00608A TABLE OF CONTENTS The Program... 3 What is BYOD?... 3 BYOD Laptop Specification...
More informationAvaya CallPilot 5.0 Library Listing
Avaya CallPilot 5.0 Library Listing 5.0 NN44200-117, 01.04 December 2010 2010 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in this document
More informationSecurity of Information Technology Resources IT-12
Security of Information Technology Resources About This Policy Effective Dates: 11-28-2007 Last Updated: 10-23-2017 Responsible University Administrator: Office of the Vice President for Information Technology
More information