University Technology
Technology-Related University 政策
-
Data Security and Handling Policy
Defines the right of the university to examine computer records or monitor computer activities and appropriate actions and measures that can be taken. -
Electronic Mail (电子邮件) Policy
Clarifies proper use of University provided electronic mail (email). -
Information Security Program Policy
Establishes the Information Security Program at Western Illinois University. -
移动 & Remote Communication Policy
的指导方针, criteria and conditions of use of mobile/remote communication devices (mobile/remote telephones, email appliances, wireless PDAs, 等). -
密码 Policy
Provides password guidance and requirements for university technology systems. -
Remote Work Policy
Remote work guidelines for administrative professional and civil service appointments. -
Security Camera Policy
The purpose of this policy is to regulate the installation and appropriate use of security cameras on WIU property, along with the temporary storage and use of recorded images. -
Technology Use Policy
States that users of university computing resources are responsible for ascertaining, understanding, and complying with the laws, 规则, 政策, 合同, and licenses applicable to their particular uses. -
Web Use, 可访问性 and Privacy Policy
Defines university website usage, accessibility and privacy requirements.
Departmental Processes & 程序
-
Administrative Information Management Systems (AIMS) 程序
Processes for requesting labels, listings, Tele-星星 messages, or surveys from the AIMS unit. -
Computer Lab Reservation 程序
Process for requesting a University Technology computer lab for faculty/classroom purposes. -
Computer Lab Software Installation Request 程序
Process for requesting the installation of specialty software in University Technology computer labs. -
DCMA & HEOA Response 程序
Actions that University Technology will take when unauthorized sharing of copyrighted material is detected on the university network. -
Information Security Program
Information on the implementation and enforcement of uTech's infosec program. -
Information Technology Governance (IT Governance)
Process for submitting and evaluating technology enhancement ideas that affect the university community. -
Microsoft Update Process
Process of how and when Microsoft patches are installed on University computers. -
Secure Wireless Configuration
Processes for configuring devices to connect to WIU's wireless network.
Connect with uTech: