Information Technology - Volume 5
This volume contains policies and procedures related to the technological environment. Subjects covered include privacy, security and responsible use of information technology resources, and policies that affect computer networks, e-mails, online course management, computer labs, help desk, software, and hardware.
To view policies within this volume, click on the relevant link below.
5.0 User Accounts
5.2 Computer Passwords
5.3 Computer Equipment Purchases and Scheduled Replacement
5.4 Vulnerability and Risk Assessment
5.5 Responsible Use of College Computing Resources
5.6 Copyright and Peer-to-Peer File Sharing
5.7 Utica University Email
5.8 Data Breach Notification
5.9 Data Security and Classification
L.02 Software Policy
L.07 Network and Internet Use
| Site Map | Printable Version