Policies

  • This policy applies to employees with privileged access to accounts, systems, or information within systems, as well those who implement, deploy or manage systems.
  • The goal of this policy is to ensure timely restoration of information in the event of accidental deletion, corruption, system failure, or disaster.
  • This policy defines the protocol to report, assess, resolve and follow-up IT incidents
  • This document outlines your responsibilities, as an employee and user of IT resources, regarding IT security. It complements and gives concrete examples but does not replace existing policies and legislation.
  • The goal of this policy is to ensure that the College’s IT resources are used to support ÆßÐDzʿª½±â€™s Mission and to define the standard of conduct expected from users.
  • All employees, students, and other users of the College’s IT resources are responsible for taking the appropriate steps, as outlined in the document ablove, to select and secure their password(s).


Last Modified: June 18, 2024