Information Technology - Volume 5
This volume contains policies and procedures related to the technological environment. Subjects covered include privacy, security and responsible use of information technology resources, and policies that affect computer networks, e-mails, online course management, computer labs, help desk, software, and hardware.
To view policies within this volume, click on the relevant link below.
5.2 Computer Passwords
5.3 Computer Equipment Purchases and Scheduled Replacement
5.4 Vulnerability and Risk Assessment
5.5 Responsible Use of College Computing Resources
5.6 Copyright and Peer-to-Peer File Sharing
5.7 Utica College Email
5.8 Data Breach Notification
5.9 Data Security and Classification
L.02 Software Policy
L.06 Account Policies
L.07 Network and Internet Use
| Site Map | Printable Version