Information Technology - Volume 5

This volume contains policies and procedures related to the technological environment. Subjects covered include privacy, security and responsible use of information technology resources, and policies that affect computer networks, e-mails, online course management, computer labs, help desk, software, and hardware.

To view policies within this volume, click on the relevant link below.

5.1   Downtime

5.2   Computer Passwords

5.3   Computer Equipment Purchases and Scheduled Replacement

5.4   Vulnerability and Risk Assessment

5.5   Responsible Use of College Computing Resources

5.6   Copyright and Peer-to-Peer File Sharing

5.8   Data Breach Notification

5.9   Data Security and Classification

Legacy Policies

L.02   Software Policy

L.06   Account Policies

L.07   Network and Internet Use

Working Policies

W 5.7   Utica College Email

Home | Contact Us | Site Map | Printable Version

I would like to see logins and resources for:

For a general list of frequently used logins, you can also visit our logins page.