.
 

IT Policies & Procedures

 

banner pushpins

     

Access to Computing Systems Managed by ITS



DIVISION: Administration and Finance

 

DEPARTMENT: Information Technology Services

 

SUBJECT: Access to Computing Systems Managed by Information Technology Services

 

OBJECTIVE & PURPOSE: To define policies and procedures related to the creation and deletion of access numbers, IDs, and/or accounts on computing systems managed by Information Technology Services.

 

AUTHORITY: Approved by the Vice President of Academic Affairs, March 3, 1993.

 

POLICY:  

Access numbers, IDs, or accounts on computing systems managed by Information Technology Services will be provided to students, faculty, and staff of the University according to the procedures outlined below. Access to these systems is granted solely for the pursuit of scholarly activity and/or other activities related directly to the mission of the University. Access to these systems is granted subject to adherence to generally accepted ethics. Unapproved or unethical use of such access may be grounds for revocation of this access.

 

Access to computing systems for students is generally granted for the duration of an academic term plus one additional consecutive term. At the end of the additional consecutive term, all student access numbers and the associated data and program files associated with these access numbers are purged. Prior to this purge, a complete backup of the affected data and program files is performed. Dormant accounts are also subject to purge. Periodic monitoring of system and storage use may be performed to identify abnormal use patterns. Exceptions to this policy are handled on a case by case basis according to the procedures outlined below.

 

Access to computing systems for faculty and staff is generally granted for the duration of the faculty or staff member's employment and is removed when employment is terminated, regardless of the nature of the termination. Periodic monitoring of system and storage use may be performed to identify dormant access numbers as candidates for removal from the system.

 

All requests for access numbers, IDs, and accounts are maintained on file permanently.

 

All computer access numbers are password protected and holders of these access numbers are advised to change passwords when they first receive the access number and on a frequent basis thereafter. Information Technology Services will reset a password with appropriate authorization and/or authentication. Information Technology Services will not give out nor confirm passwords over the telephone.

 

PROCEDURE:  

Requests for faculty and staff access to the University's local area network, the Northeast Regional Data Center, the Northwest Regional Data center, or any other regional data center of the SUS, are to be made using the on-line Computer User ID/Account Request System. The appropriate dean, director, or department head should submit such requests.

 

Requests for student access may be made in one of two ways: (1) by an instructor when accounts are desired for all students in a class or (2) by an individual student who may make this request at the Main Computer Lab, located on the second floor of the Mathews Building.

 

Issued
By


L. Taylor
Date
Issued


11/2/90
Effective
Date


11/2/90
Revised
By


 
Revision
Number


3
Revision
Date


11/01/2001
Procedure