The following are our current policies, procedures and guidelines which govern technology use on campus. Please refer to this page if you need guidance and clarification.
Acceptable Use Policy – What your computer account is for and what rules govern it.
Copyright Policy – Policy pertaining to copyrights and infringement.
IT Security Policy, BOG policy #35 – Policy concerning the security of IT resources.
Excessive Network Usage – Excessive use of the network and/or Internet.
Guest Internet Access – Internet access for guests of Shepherd.
Passwords – Policy governing the use and security of passwords.
Peer-To-Peer Networks – Use of peer-to-peer (p2p) networks.
Personal Device Use – Use of personally owned devices at Shepherd and on our network.
Personal Network Gear – Use of personally owned network gear (hubs/switches/routers/etc.) on Shepherd’s network.
Personal Tips For Information Security – Tips for securing your personal information
Supported Operating Systems – What Operating Systems (OSes) can be used on our network?
Upgrading University Hardware and Software – Policies governing changes and upgrades of lab and office computers.
USB Flash drives – Use of USB flash drives and their security.
Wireless Devices – Use of wireless devices on the Shepherd network.