Davis Student Handbook 2023-24

COMPUTER USAGE POLICIES

I. DAVIS COLLEGE Davis College’s information technology resources, including email and Internet access, are provided for business and educational purposes. Students, faculty, staff, and guests (hereinafter referred to as users) are expected to adhere to the following policy for continued access to the college’s technological resources. Users should report security risks or violations to staff, faculty, or a network administrator. Overview Davis College provides its students, faculty, staff and guests (hereinafter referred to as users) with Internet and E-Mail access to help in the fulfillment of job responsibilities and for educational services. Users must understand that any connection to the Internet offers the opportunity for non-authorized users to view or access school information. Therefore, it is important that all connections be secure, controlled, and monitored. Purpose The purpose of this policy is to describe what steps must be taken to ensure that users connecting to Davis College’s network are authenticated in an appropriate manner, in compliance with school standards, and are given the least amount of access required to perform their job function or meet their educational needs. This policy specifies what constitutes appropriate use of network accounts and authentication standards. Scope The scope of this policy includes all who have access to school-owned or school-provided computers or require access to Davis College’s network and/or systems. This policy applies not only to employees and students, but also to guests, contractors, and anyone requiring access to the college’s network. Public access to the college’s externally-reachable systems, such as its website or public web applications, are specifically excluded from this policy. Policy Account Setup During initial account setup, certain checks must be performed to ensure the integrity of the process. The following policies apply to account setup: • Positive ID and coordination with Human Resources, the Registrar’s Office, or the Student Development Office (in regards to guests) is required. • Users will be granted the least amount of network access required to perform his or her job function or meet their educational needs.

• Users will be granted access only if he or she accepts the Acceptable Use Policy. • Access to the network will be granted in accordance with the Acceptable Use Policy.

Account Use Network accounts must be implemented in a standard fashion and utilized consistently across the organization. The following policies apply to account use: • Accounts must be created using a standard format (i.e., first name-last name, or first initial-last name, etc.) • Accounts must be password protected (refer to section 4.3 Password Policy for more detailed information). • User accounts must not be given administrator or ‘root’ access unless this is necessary to perform his or her job function. • Individuals requiring access to confidential data must have an individual, distinct account. This account may be subject to additional monitoring or auditing at the discretion of the IT Manager or Operations Team, or as required by applicable regulations or third-party agreements.

SERVICES AVAILABLE

38

Made with FlippingBook - Online Brochure Maker