APPROVAL
The Information Systems policies in this manual were reviewed and approved by the following entities:
Information Systems Planning Committee (ISPC)
Reviewed, revised, and approved 04/07/2017
President's Cabinet
Reviewed and approved 09/09/2009
ACKNOWLEDGMENTS
Overall policy manual framework
The framework for this policy manual was patterned after concepts used at Cornell University as found during early research for this policy rewrite in spring of 2009. The Cornell Office of Information Technology policy web pages since then have been updated and are no longer available online but the general concepts of Cornell IT policy framework are described in the following Power Point presentation made at the EDUCAUSE Security Professional Conference, April 2006:
Section 3-Responsible use of Information Technology Resources
This section was modeled from similar policies found at Oberlin and Earlham universities.
Section 4-Responsible Use of Electronic Files and Communications
This section was modeled from similar policies found at Goshen College and Cornell University.
Section 4-Responsible Use of Electronic Files and Communications
Compliance Checklist for Unsolicited Commercial Email Messages
Substantial portions of the guidelines on this checklist were adapted from the Northeastern University July 2004, Summary of Federal and State anti-spam regulations.
Section 6-Security of Electronic Administrative Information
This section was modeled from similar policies found at Goshen College.
Section 8-Implementation Procedures for Red Flags Rule
This section was modeled from a similar policy found at Kalamazoo College which was posted on the EDUCAUSE.edu website.