IT Services Policies and Procedures
The following are our current policies, procedures and guidelines which govern technology use on campus. Please refer to this page if you need guidance and clarification.
Policies
IT Security Policy, BOG policy #35 – Policy concerning security of IT resources.
Acceptable Use Policy – What your computer account is for and what rules govern usage.
Access Control Policy – Procedures for controlling access to accounts.
Backup and Recovery Policy – Policy pertaining to the backing up and recovery of data.
Change Management Policy – Policy for managing changes to the IT infrastructure.
Data Classification Policy – How any data collected is classified.
Data Disposal Policy – The policy for governing how electronic and physical data are disposed of.
Data Encryption Policy – Policy for encryption of data at rest and in transit.
Data Inventory Policy – Policy for how data is inventoried and its location.
E-Mail Policy – What policies and procedures apply to email address provisioning and usage.
Information Privacy Notice – How personal information is collected, used, and protected.
International Travel Security Policy – How to safeguard data when traveling out of the country
IT Information Security & Privacy Policy – Safeguards to protect information assets and IT resources.
Patch Management Policy – How we maintain our patches for critical systems.
Risk Management Policy – Management of Risk to University Resources.
Vendor Management Policy – Policy pertaining to the data stored with vendors and its handling.
Guidelines
Password Guidelines – Password complexity requirements.
SSN Guidelines – Proper handling of Social Security Numbers.
Work from Home & Remote Access Guidelines – Requirements for connecting to Shepherd University’s network from external host or from off-campus.
Processes
Computer Replenishment (Faculty/Staff) – Replacement process for University owned computers.
Guest User Computer Account Request – Request a computer guest user account.
Standards
Information Security Program – Program for assuring our information security is up-to-date and relevant.
Personal Device Use – Use of personally owned devices at Shepherd and on our network.
Personal Network Gear – Use of personally owned network gear (hubs/switches/routers/etc.) on Shepherd’s network.
Supported Operating Systems – What Operating Systems (OSes) can be used on our network?
Wireless Devices – Use of wireless devices on the Shepherd network.
Last updated June 24, 2025