1300. Information Technology

Articles (10)

1301. Acceptable Use Policy

The purpose of this policy is to outline the acceptable use of computer equipment at Montana Technological University. These rules are in place to protect the faculty, staff, students and affiliated users and Montana Technological University. Inappropriate use exposes Montana Technological University to risks including virus attacks, compromise of network systems and services, and legal issues.

1302. Commisioner's TikTok Directive

The Office of the Commissioner of Higher Education directs the following:

1303. Escalation Procedures for Security Incidents

This procedure describes the steps which are to be taken for physical and computer security incidents which occur within the Montana Tech facility.

1304. Incident Handling Policy

This policy governs the general response that should be used when a computer and/or information security incident has been encountered.

1305. Montana Technological University Account Procedure

The purpose of this Procedure is to establish a standard for the creation, administration, use, and removal of accounts that facilitate access to information and technology resources at Montana Tech.

1306. Network Connection Policy

This policy describes the requirements and constraints for attaching a computer to the Montana Tech local area network (LAN). All devices connected to the Montana Tech network must meet minimum-security requirements.

1307. Personal Computer Device Support Policy

In response to the increasing number of support requests made to Information Technology (IT) regarding personally owned computing devices (POCD), Montana Tech IT has established an official POCD support policy. The purpose of this policy is to define the support options available for personally owned computing devices.

1308. Software Piracy

Whether you call it borrowing, copying, sharing or "fair use," software piracy is illegal and puts Montana Tech's students, faculty and staff, as well as the college itself, at risk for legal action.

1309. Special Access Guidelines

These guidelines outline the many do's and do not's of using special access accounts. Special access is defined as having the privilege and password to use domain administrator accounts or any account with elevated privileges.

1310. State Telephone Policies

The facilities of the state's telecommunications systems are provided principally for the conduct of state business. In addition to state business, the state's telecommunications systems may be used by: