IT Services Policies and Procedures
The following are our current policies, procedures and guidelines which govern technology use on campus. Please refer to this page if you need guidance and clarification.
Acceptable Use Policy – What your computer account is for and what rules govern it.
Copyright Policy – Policy pertaining to copyrights and infringement.
IT Security Policy, BOG policy #35 – Policy concerning the security of IT resources.
Process for the replacement of University owned computers. Replacement process for Shepherd University owned systems in faculty and administrative offices, and labs.
Excessive Network Usage – Excessive use of the network and/or Internet.
Guest Internet Access – Internet access for guests of Shepherd.
Passwords – Policy governing the use and security of passwords.
Peer-To-Peer Networks – Use of peer-to-peer (p2p) networks.
Personal Device Use – Use of personally owned devices at Shepherd and on our network.
Personal Network Gear – Use of personally owned network gear (hubs/switches/routers/etc.) on Shepherd’s network.
Personal Tips For Information Security – Tips for securing your personal information
Supported Operating Systems – What Operating Systems (OSes) can be used on our network?
Upgrading University Hardware and Software – Policies governing changes and upgrades of lab and office computers.
USB Flash drives – Use of USB flash drives and their security.
Wireless Devices – Use of wireless devices on the Shepherd network.