University Technology
Technology-Related University Policies
-
Data Security and Handling Policy
Defines the right of the university to examine computer records or monitor computer activities and appropriate actions and measures that can be taken. -
Electronic Mail (Email) Policy
Clarifies proper use of University provided electronic mail (email). -
Information Security Program Policy
Establishes the Information Security Program at Western Illinois University. -
Mobile & Remote Communication Policy
Guidelines, criteria and conditions of use of mobile/remote communication devices (mobile/remote telephones, email appliances, wireless PDAs, etc). -
Password Policy
Provides password guidance and requirements for university technology systems. -
Remote Work Policy
Remote work guidelines for administrative professional and civil service appointments. -
Security Camera Policy
The purpose of this policy is to regulate the installation and appropriate use of security cameras on WIU property, along with the temporary storage and use of recorded images. -
Technology Use Policy
States that users of university computing resources are responsible for ascertaining, understanding, and complying with the laws, rules, policies, contracts, and licenses applicable to their particular uses. -
Web Use, Accessibility and Privacy Policy
Defines university website usage, accessibility and privacy requirements.
Departmental Processes & Procedures
-
Administrative Information Management Systems (AIMS) Procedures
Processes for requesting labels, listings, Tele-STARS messages, or surveys from the AIMS unit. -
Computer Lab Reservation Procedures
Process for requesting a University Technology computer lab for faculty/classroom purposes. -
Computer Lab Software Installation Request Procedures
Process for requesting the installation of specialty software in University Technology computer labs. -
DCMA & HEOA Response Procedures
Actions that University Technology will take when unauthorized sharing of copyrighted material is detected on the university network. -
Information Security Program
Information on the implementation and enforcement of uTech's infosec program. -
Information Technology Governance (IT Governance)
Process for submitting and evaluating technology enhancement ideas that affect the university community. -
Microsoft Update Process
Process of how and when Microsoft patches are installed on University computers. -
Secure Wireless Configuration
Processes for configuring devices to connect to WIU's wireless network.
Connect with uTech: