University Technology
Technology-Related University Policies
-
Appropriate Use Policy
States that users of university computing resources are responsible for ascertaining, understanding, and complying with the laws, rules, policies, contracts, and licenses applicable to their particular uses. Formerly known as the Computer Use Policy. -
Computer Anti-Virus Policy
Defines the use of computer anti-virus software on university computing resources and actions taken when computer viruses are detected. -
Credit Card Handling Policy
Defines requirements for accepting credit cards as payment. -
Database, Data Mart, Data Warehouse Policy
Defines the authoritative source of electronic university records and appropriate usage/access of said data. -
Data Security Policy
Defines the right of the university to examine computer records or monitor computer activities and appropriate actions and measures that can be taken. -
DCMA and HEOA Response Policy
Defines the ways in which the university complies with the Digital Millennium Copyright Act (DMCA) and Higher Education Opportunity Act (HEOA) regarding the unauthorized distribution of copyrighted materials. -
E-Mail Usage and Political Activity Policy
Clarifies legal rights of employees and students with respect to political elections and e-mail/electronic bulletin board usage. -
Encryption Policy
Defines the types of encryption algorithms allowed by university technologies and additional requirements for systems hosting sensitive data. -
Mobile & Remote Communication Policy
Guidelines, criteria and conditions of use of mobile/remote communication devices (mobile/remote telephones, email appliances, wireless PDAs, etc). -
Password Policy
Provides password guidance and requirements for university technology systems. -
Patching Policy
Defines how and when security patches are applied to university computers and systems. -
Social Security Number (SSN) Usage and Protection Policy
Defines how the university handles and protects social security numbers. -
Web Accessibility Policy
Defines university website accessibility requirements. -
Web Privacy Policy
Defines the information collected of visitors to university web pages. -
Web Use Policy
Defines the requirements of all official university websites. -
Wireless Policy
Defines the types of wireless internet devices allowed on the university network and guidelines for usage. -
WIU LAN Bulletin Board Usage Policy
Defines the restrictions for posting on the online WIU bulletin board.
Departmental Processes & Procedures
-
Administrative Information Management Systems (AIMS) Procedures
Processes for requesting labels, listings, Tele-STARS messages, or surveys from the AIMS unit. -
Computer Lab Reservation Procedures
Process for requesting a University Technology computer lab for faculty/classroom purposes. -
Computer Lab Software Installation Request Procedures
Process for requesting the installation of specialty software in University Technology computer labs. -
DCMA & HEOA Response Procedures
Actions that University Technology will take when unauthorized sharing of copyrighted material is detected on the university network. -
Information Technology Governance (IT Governance)
Process for submitting and evaluating technology enhancement ideas that affect the university community. -
Microsoft Update Process
Process of how and when Microsoft patches are installed on University computers. -
Secure Wireless Configuration
Processes for configuring devices to connect to WIU's wireless network.
Connect with uTech: