Main Menu

IT Services Policies and Procedures

The following are our current policies, procedures and guidelines which govern technology use on campus. Please refer to this page if you need guidance and clarification.


Policies
Acceptable Use PolicyWhat your computer account is for and what rules govern it.

Copyright PolicyPolicy pertaining to copyrights and infringement.

IT Security Policy, BOG policy #35Policy concerning the security of IT resources.


Guidelines
Excessive Network UsageExcessive use of the network and/or Internet.

Guest Internet AccessInternet access for guests of Shepherd.

PasswordsPolicy governing the use and security of passwords.

Peer-To-Peer NetworksUse of peer-to-peer (p2p) networks.

Personal Device UseUse of personally owned devices at Shepherd and on our network.

Personal Network GearUse of personally owned network gear (hubs/switches/routers/etc.) on Shepherd’s network.

Personal Tips For Information SecurityTips for securing your personal information

Supported Operating SystemsWhat Operating Systems (OSes) can be used on our network?

Upgrading University Hardware and SoftwarePolicies governing changes and upgrades of lab and office computers.

USB Flash drivesUse of USB flash drives and their security.

Wireless DevicesUse of wireless devices on the Shepherd network.