IT Services Policies and Procedures
The following are our current policies, procedures and guidelines which govern technology use on campus. Please refer to this page if you need guidance and clarification.
Policies
IT Security Policy, BOG policy #35 – Policy concerning security of IT resources.
Acceptable Use Policy – What your computer account is for and what rules govern usage.
Access Control Policy – Procedures for controlling access to accounts.
Data Classification Policy – How any data collected is classified.
Data Incident Notification Policy – Policy for how notifications about data incidents are handled.
E-Mail Policy – What policies and procedures apply to email address provisioning and usage.
Information Privacy Notice – How personal information is collected, used, and protected.
International Travel Security Policy – How to safeguard data when traveling out of the country
IT Information Security & Privacy Policy – Safeguards to protect information assets and IT resources.
Guidelines
Password Guidelines – Password complexity requirements.
SSN Guidelines – Proper handling of SSN.
Work from Home & Remote Access Guidelines – Requirements for connecting to Shepherd University’s network from external host or from off-campus.
Processes
Computer Replenishment (Faculty/Staff) – Replacement process for University owned computers.
Guest User Computer Account Request – Request a computer guest user account.
Standards
Information Security Program – Program for assuring our information security is up-to-date and relevant.
Personal Device Use – Use of personally owned devices at Shepherd and on our network.
Personal Network Gear – Use of personally owned network gear (hubs/switches/routers/etc.) on Shepherd’s network.
Supported Operating Systems – What Operating Systems (OSes) can be used on our network?
Wireless Devices – Use of wireless devices on the Shepherd network.
Last updated August 12, 2024