Main Menu

IT Services Policies and Procedures

The following are our current policies, procedures and guidelines which govern technology use on campus. Please refer to this page if you need guidance and clarification.

Policies

IT Security Policy, BOG policy #35 – Policy concerning security of IT resources.

Acceptable Use Policy – What your computer account is for and what rules govern usage.

Data Classification Policy – How any data collected is classified.

Data Incident Notification Policy – Policy for how notifications about data incidents are handled.

E-Mail Policy – What policies and procedures apply to email address provisioning and usage.

Information Privacy Notice – How personal information is collected, used, and protected.

International Travel Security Policy – How to safeguard data when traveling out of the country

IT Information Security & Privacy Policy – Safeguards to protect information assets and IT resources.

Guidelines

Password Guidelines – Password complexity requirements.

SSN Guidelines – Proper handling of SSN.

Work from Home & Remote Access Guidelines – Requirements for connecting to Shepherd University’s network from external host or from off-campus.

Processes

Computer Replenishment (Faculty/Staff) – Replacement process for University owned computers.

Guest User Computer Account Request – Request a computer guest user account.

Standards

Information Security Program – Program for assuring our information security is up-to-date and relevant.

Personal Device UseUse of personally owned devices at Shepherd and on our network.

Personal Network GearUse of personally owned network gear (hubs/switches/routers/etc.) on Shepherd’s network.

Supported Operating SystemsWhat Operating Systems (OSes) can be used on our network?

Wireless DevicesUse of wireless devices on the Shepherd network.