Information Technology - Volume 5

This volume contains policies and procedures related to the technological environment. Subjects covered include privacy, security and responsible use of information technology resources, and policies that affect computer networks, e-mails, online course management, computer labs, help desk, software, and hardware.

To view policies within this volume, click on the relevant link below.

5.0   User Accounts

5.1   Downtime

5.2   Computer Passwords

5.3   Computer Equipment Purchases and Scheduled Replacement

5.4   Vulnerability and Risk Assessment

5.5   Responsible Use of University Computing Resources

5.6   Copyright and Peer-to-Peer File Sharing

5.7   Utica University Email

5.8   Data Breach Notification

5.9   Data Security and Classification

Legacy Policies

L.02   Software Policy

Home | Contact Us | Site Map | Printable Version

I would like to see logins and resources for:

For a general list of frequently used logins, you can also visit our logins page.