Changing Computer and Network Policies

Tags policy

What Is It?

It is recognized the policies contained herein are subject to change as technology, campus mission and organization, and economic priorities advance. To ensure that these policies are kept up to date and reflect current needs, this statement of policy is necessary.

Changing Computer and Network Policies

The policies contained within this document are subject to change in technology, campus mission and organization, and economic priorities, among other influences. To ensure that these governing policies adequately reflect the current needs of the institution, policy review and modification (as needed) shall occur at least once a year, though changes may be proposed and implemented at any time.


The following procedures must be followed to ensure that necessary changes in policies have the authority and support of relevant campus entities. Such entities include, but are not limited to, students, staff, faculty, and administration.


The primary entity responsible for monitoring such changes it the Telecommunication Committee, whose membership includes all the above groups.  The annual policy review and proposed changes shall be initiated by this committee, in discussions that are open to all members of the campus community. This committee must approve all changes. No proposed changes shall be approved by the committee unless they are deemed by Network Services to be operationally feasible. As needed, the committee shall request budget/finance and academic/administrative reviews.


After completing a thorough review of existing policies and proposed changes, the committee shall send the updated document to the Chancellor of final approval. If the Chancellor chooses to consult resources outside the purview of the committee, he may do so at his discretion.
Annual approval of the reviewed and updated policies shall be indicated by the signature of the current committee chair and Chancellor. This signature sheet shall reside with a master copy of this policy document that is maintained on behalf of the committee by Network Services. The current policy document shall be available for all users via the Montana Tech website.

Details

Article ID: 78372
Created
Wed 5/15/19 9:50 AM
Modified
Wed 2/12/20 2:36 PM

Related Articles (11)

Statement regarding responsible use of computers and network systems
Guidelines for use of the computing systems and facilities located at, or operated by Montana Tech
This procedure describes the steps which are to be taken for physical and computer security incidents which occur within the Montana Tech facility.
Procedures for dealing with computer security incidents
This policy describes the requirements and constraints for attaching a computer to the Montana Tech local area network (LAN). All devices connected o the Montana Tech network must meet minimum-security requirements.
The core of the Institute is the many security practitioners in government agencies, corporations, and universities around the world who invest hundreds of hours each year in research and teaching to help the entire SANS community.
In response to the increasing number of support requests made to Information Technology (IT) regarding personally owned computing devices (POCD), Montana Tech IT has established an official POCD support policy. The purpose of this policy is to define the support options available for personally owned computing devices.
Whether you call it borrowing, copying, sharing or "fair use," software piracy is illegal and puts Montana Tech's students, faculty and staff, as well as the college itself, at risk for legal action.
This agreement outlines the many do's and do not's of using special access accounts. Special access is defined as having the privilege and password to use domain administrator accounts.
This policy provides a set of requirements for the regulation of special access use on the Montana Tech Computer System. This policy will provide a mechanism for the addition and removal of people from the special access status and a mechanism for periodic reviews of the special access status.
This document establishes computer usage guidelines for the Montana Tech support staff in the course of their job duties on the Montana Tech Campus Computer Systems. These guidelines are intended to protect the rights and privacy of Montana Tech clients as well as those of the Montana Tech support staff.