IT Services Policies and Procedures
The following are our current policies, procedures and guidelines which govern technology use on campus. Please refer to this page if you need guidance and clarification.
Policies
IT Security Policy, BOG policy #35 – Policy concerning security of IT resources.
– What your computer account is for and what rules govern usage.
– Procedures for controlling access to accounts.
– Policy pertaining to the backing up and recovery of data.
– Policy for managing changes to the IT infrastructure.
– How any data collected is classified.
– The policy for governing how electronic and physical data are disposed of.
– Policy for encryption of data at rest and in transit.
– Policy for how data is inventoried and its location.
– What policies and procedures apply to email address provisioning and usage.
– How personal information is collected, used, and protected.
– How to safeguard data when traveling out of the country
– Safeguards to protect information assets and IT resources.
– How we maintain our patches for critical systems.
– Management of Risk to University Resources.
– Policy pertaining to the data stored with vendors and its handling.
Guidelines
– Password complexity requirements.
– Proper handling of Social Security Numbers.
– Requirements for connecting to ºÚÁϳԹÏÍøUniversity’s network from external host or from off-campus.
Processes
– Replacement process for University owned computers.
Guest User Computer Account Request – Request a computer guest user account.
Standards
– Program for assuring our information security is up-to-date and relevant.
– Use of personally owned devices at ºÚÁϳԹÏÍøand on our network.
– Use of personally owned network gear (hubs/switches/routers/etc.) on Shepherd’s network.
Supported Operating Systems – What Operating Systems (OSes) can be used on our network?
Wireless Devices – Use of wireless devices on the ºÚÁϳԹÏÍønetwork.
Last updated June 24, 2025