Network/Computer Use Policies

Tags policy

What Is It?

This policy document is promulgated in order to establish an orderly process for articulating and managing computer and networking systems and facilities at Montana Technological University. This document determines the standards for appropriate use of computing and networking systems and facilities at Montana Technology University. The users of these systems and facilities, and thus, of these policies, include faculty, students, staff, administration, and any others who make use of these resources. The policies articulated here apply to all users of these systems and facilities.

The following Security Policies have been modeled on templates provided by the SANS Institute. The SANS (System Administration, Networking, and Security) Institute is a cooperative research and education organization through which more than 96,000 system administrators, security professionals, and network administrators share the lessons they are learning and find solutions for challenges they face. SANS was founded in 1989.

Where Can I Get It?

The core of the Institute is the many security practitioners in government agencies, corporations, and universities around the world who invest hundreds of hours each year in research and teaching to help the entire SANS community.

These policies are also enforced at Montana Technological University

University of Montana Information Technology Policies
https://www.umt.edu/policies/browse/information-technology

Montana Board of Regents Information Technology Policies
http://mus.edu/borpol/bor1300/bor1300.asp

Following are brief summaries of the contents of each document followed by a link to the complete document. These terms are used throughout the documents:

  • ISO - Installation (physical) Security Officer - Layne Sessions
  • CSO – Computer (and Network) Security Officer – Jennifer Simon
  • CSA - Computer (and Network) Security Analyst – Yvonie Laughery
  • LSA - Lead System Analyst – depends upon the system
  • CERT - Computer Emergency Response Team
  • CIAC - Computer Incident Advisory Capability
  • Coordinator – College Computer Specialist

Acceptable Use Statement (Summary)

Users shall not purposely engage in activity with the intent to: harass other users; degrade the performance of systems; deprive an authorized Montana Technological University user access to a Montana Technological University resource; obtain extra resources, beyond those allocated; circumvent Montana Technological University computer security measures or gain access to a Montana Technological University system for which proper authorization has not been given. For complete detailed information please navigate to the link:

Acceptable use Statement full version


Abuse Statement (Summary)

The use of computers or network systems in the College setting in no way exempts any member from the normal requirements of ethical or legal behavior. Use of a computer and network system that is shared by many users imposes certain additional obligations. Each member of the community is responsible for his/her actions whether or not rules are built in, and whether or not they can be circumvented. Refer to the document below for more discussion.

For complete detailed information please refer to the link below:

Abuse Statement full version


Software Piracy: What You Should Know

Whether you call it borrowing, copying, sharing or "fair use", software piracy is illegal and puts Montana Technological University's students, faculty and staff, as well as the college itself, at risk for legal action. Following are questions and answers relating to software piracy.

For complete detailed information please refer to the link below:

Software Piracy full version


Incident Handling Procedure (Summary)

This document provides some general guidelines and procedures for dealing with computer security incidents. The document is meant to provide Montana Technological University support personnel with some guidelines on what to do if they discover a security incident.

For complete detailed information please refer to the link below:

Incident Handling Procedure full version


Escalation Procedures for Security Incidents (Summary)

This procedure describes the steps, which are taken for physical, and computer security incidents that occur within the Montana Technological University facility.

For complete detailed information please refer to the link below:

Escalation Procedures full version


Network Connection Policy (Summary)

This policy describes the requirements and constraints for attaching a computer to the Montana Technological University local area network (LAN). All devices connected to the Montana Technological University network must meet minimum-security requirements.

The intent of this policy is to ensure that all systems installed on the Montana Technological University network are maintained at appropriate levels of security while at the same time not impeding the ability of Montana Technological University users and support staff to perform their work.

Secured and unsecured systems are discussed. For detailed information please refer to the link below:

For complete detailed information please refer to the link below:

Network Connection Policy


Special Access Guidelines Agreement (Summary)

This agreement outlines the many do's and do not's of using special access accounts. Special access is defined as having the privilege and password to use domain administrator accounts.

For complete detailed information please refer to the link below:

Special Access Guidelines full version


Special Access Policy (Summary)

This policy provides a set of requirements for the regulation of special access use on the Montana Technological University Computer System. This policy will provide a mechanism for the addition and removal of people from the special access status and a mechanism for periodic reviews of the special access status.

For complete detailed information please refer to the link below:

Special Access Policy full version


Support Staff Guidelines (Summary)

This document establishes computer usage guidelines for the Montana Technological University support staff in the course of their job duties on the Montana Technological University Campus Computer Systems. These guidelines are intended to protect the rights and privacy of Montana Technological University clients as well as those of the Montana Technological University support staff.

For complete detailed information please refer to the link below:

Support Staff Guidelines full version


Changing Computer and Network Policies

It is recognized the policies contained herein are subject to change as technology, campus mission and organization, and economic priorities advance. To ensure that these policies are kept up to date and reflect current needs, this statement of policy is necessary.

For complete detailed information please refer to the link below:

Changing Computer and Network Policy full version