To Home Page To Home Page
General Description
Requirements
Policy Provisions
Performance Evaluation
Subject Experts
Computer Services--Secure Use of Computers
Policy

Document Number: HR--140 Revision #: 1.0
Document Owner: Executive VP Date Last Updated: 08/17/2012
Primary Author: Director of Information Technology Status: Approved
Date Originally Created: 01/17/2012

General Description
Description:

Information about secure use of computers relative to HR policy.


Purpose:

Delineation of policy.


Scope:

All faculty, staff, students, and administrators


Responsibility: Director of IT
Human Resources
VP of Business and Finance

Back to Top

Requirements
Relevant Knowledge: In order to comply with this policy you should know:
Current University policy

Terms and Definitions: Additional training

Corrective Action

Loss of privilege, general

Back to Top

Policy Provisions
1.

Secure Use of Computers


Users of Cumberland computer resources are responsible for the correct and sufficient use of the tools available for maintaining the security of information stored on each stand-alone computer and/or computer system. While ultimate responsibility for resolution of problems related to the invasion of the user's privacy or loss of data rests with the user, a reasonable effort will by made by Cumberland to lessen the impact of such loss or damage. Users are responsible for observing the following precautions:

 

1. Computer accounts, passwords, and other types of authorization that are assigned to individual users are not to be shared with others.

2. The user must assign an obscure alphanumeric account password of at least six (6) characters and numbers. Passwords must be changed frequently.

3. The user must understand the level of protection each computer system automatically applies to files and supplement, if necessary, for sensitive information.

4. The user must make regular backups of important data and other essential information to network server.

5. The user must be aware of computer viruses and other destructive programs and take steps to avoid being a victim or unwitting distributor of these processes. User may not disable or uninstall University approved virus protection software.

6. The user should be aware that Cumberland computing resources, including software such as electronic mail, are not necessarily secure or private. Users should not use University email for sensitive personal correspondence.

 


Back to Top

Performance Evaluation
Performance Metrics: Compliance with standard policy and procedure

Consequences: Further training
Loss of privileges

Back to Top

Subject Experts
The following may be consulted for additional information.
Director of Human Resources

Director of Information Technology

VP of Business and Finance

Back to Top

This page created 10/30/2014 using Zavanta® version 6.0