Montana Tech Network Policies

Tags policy

What Is It?

This policy document is promulgated in order to establish an orderly process for articulating and managing computer and networking systems and facilities at Montana Technological University. This document determines the standards for appropriate use of computing and networking systems and facilities at Montana Tech. The users of these systems and facilities, and thus, of these policies, include faculty, students, staff, administration, and any others who make use of these resources. The policies articulated here apply to all users of these systems and facilities.

The following Security Policies have been modeled on templates provided by the SANS Institute. The SANS (System Administration, Networking, and Security) Institute is a cooperative research and education organization through which more than 96,000 system administrators, security professionals, and network administrators share the lessons they are learning and find solutions for challenges they face. SANS was founded in 1989.

Where Can I Get It?

The core of the Institute is the many security practitioners in government agencies, corporations, and universities around the world who invest hundreds of hours each year in research and teaching to help the entire SANS community.

These policies are also enforced at Montana Tech

University of Montana Information Technology Policies

Montana Board of Regents Information Technology Policies

Following are brief summaries of the contents of each document followed by a link to the complete document. These terms are used throughout the documents:

  • ISO - Installation (physical) Security Officer - Layne Sessions
  • CSO – Computer (and Network) Security Officer – Jennifer Simon
  • CSA - Computer (and Network) Security Analyst – Yvonie Laughery
  • LSA - Lead System Analyst – depends upon the system
  • CERT - Computer Emergency Response Team
  • CIAC - Computer Incident Advisory Capability
  • Coordinator – College Computer Specialist

Acceptable Use Statement (Summary)

Users shall not purposely engage in activity with the intent to: harass other users; degrade the performance of systems; deprive an authorized Montana Tech user access to a Montana Tech resource; obtain extra resources, beyond those allocated; circumvent Montana Tech computer security measures or gain access to a Montana Tech system for which proper authorization has not been given. For complete detailed information please navigate to the link:

Acceptable use Statement full version

Abuse Statement (Summary)

The use of computers or network systems in the College setting in no way exempts any member from the normal requirements of ethical or legal behavior. Use of a computer and network system that is shared by many users imposes certain additional obligations. Each member of the community is responsible for his/her actions whether or not rules are built in, and whether or not they can be circumvented. Refer to the document below for more discussion.

For complete detailed information please refer to the link below:

Abuse Statement full version

Software Piracy: What You Should Know

Whether you call it borrowing, copying, sharing or "fair use", software piracy is illegal and puts Montana Tech's students, faculty and staff, as well as the college itself, at risk for legal action. Following are questions and answers relating to software piracy.

For complete detailed information please refer to the link below:

Software Piracy full version

Incident Handling Procedure (Summary)

This document provides some general guidelines and procedures for dealing with computer security incidents. The document is meant to provide Montana Tech support personnel with some guidelines on what to do if they discover a security incident.

For complete detailed information please refer to the link below:

Incident Handling Procedure full version

Escalation Procedures for Security Incidents (Summary)

This procedure describes the steps, which are taken for physical, and computer security incidents that occur within the Montana Tech facility.

For complete detailed information please refer to the link below:

Escalation Procedures full version

Network Connection Policy (Summary)

This policy describes the requirements and constraints for attaching a computer to the Montana Tech local area network (LAN). All devices connected o the Montana Tech network must meet minimum-security requirements.

The intent of this policy is to ensure that all systems installed on the Montana Tech network are maintained at appropriate levels of security while at the same time not impeding the ability of Montana Tech users and support staff to perform their work.

Secured and unsecured systems are discussed. For detailed information please refer to the link below:

For complete detailed information please refer to the link below:

Network Connection Policy

Special Access Guidelines Agreement (Summary)

This agreement outlines the many do's and do not's of using special access accounts. Special access is defined as having the privilege and password to use domain administrator accounts.

For complete detailed information please refer to the link below:

Special Access Guidelines full version

Special Access Policy (Summary)

This policy provides a set of requirements for the regulation of special access use on the Montana Tech Computer System. This policy will provide a mechanism for the addition and removal of people from the special access status and a mechanism for periodic reviews of the special access status.

For complete detailed information please refer to the link below:

Special Access Policy full version

Support Staff Guidelines (Summary)

This document establishes computer usage guidelines for the Montana Tech support staff in the course of their job duties on the Montana Tech Campus Computer Systems. These guidelines are intended to protect the rights and privacy of Montana Tech clients as well as those of the Montana Tech support staff.

For complete detailed information please refer to the link below:

Support Staff Guidelines full version

Changing Computer and Network Policies

It is recognized the policies contained herein are subject to change as technology, campus mission and organization, and economic priorities advance. To ensure that these policies are kept up to date and reflect current needs, this statement of policy is necessary.

For complete detailed information please refer to the link below:

Changing Computer and Network Policy full version