WSCU Information Technology Policies
All Support Policies of the Information Technology Services Department are located here.
In order to serve students, faculty and staff more effectively WSCU has an Information Technology Support Policy. This policy is meant to clarify and communicate the services IT Services is able to provide to the campus community.
IT Services only supports hardware that is owned by the University and used for University business and has been approved via the Hardware/Software Requisition process (HSR). Hardware which falls within the standard categories below must be selected from the approved models. If your hardware is not listed and/or does not fall within a category listed below, contact IT Services.
Access to computing and networking resources is a privilege to which all Western State Colorado University faculty, staff, and students are entitled. Certain responsibilities accompany that privilege; understanding them is important for all computer users.
Your password is the primary mechanism for assuring the privacy of your computing activity and preventing others from using your computer account for disruptive, offensive, or illegal activities. Passwords address our primary concern: maintaining the integrity of your account while protecting WSCU's computer environment, as well as you, from abuse. This document is meant to clarify our reasoning and our methods for governing passwords, describe some procedures that WSCU has instituted to help you protect your computing account from unauthorized use, and suggest good practices.
To decrease the exposure of information to unauthorized access, campus computers are subject to a mandatory screen lock.
Manager accounts are for users requiring special access to their computers.
The Digital Millennium Copyright Act, signed into law on October 28, 1998, amended the United States Copyright Act, Title 17 of the U.S. Code, to provide in part certain limitations on the liability of online service providers (OSPs) for copyright infringement.
Practices and procedures for the storage, handling, access and transmission of digital High Risk Confidential Information (HRCI).