BOARD OF REGENTS POLICIES BOARD OF REGENTS POLICIES COMPRISE

  4(4) THE BOARD OF DIRECTORS’ OF AB
 2019 CRA EDITS BOARD OF GOVERNORS OF THE
THERMODYNAMICS AND KINETICS OF THE NANOCHECKERBOARD FORMATION YONG

(THE “COMPANY”) BOARD RESOLUTION REGARDING THE REGISTRATION OF
11 PL130948 ONTARIO MUNICIPAL BOARD COMMISSION DES
13 UTICA COLLEGE INSTITUTIONAL REVIEW BOARD RESEARCH

Board of Regents policies

Board of Regents policies

Board of Regents policies comprise a relatively stable set of policies that govern Montana University System activities. This inventory organizes Board of Regents policies in two categories:

Board of Regents IT-specific policies – 1300 range

BOR 1300.1 Security of data and information technology resource
BOR 1302 Privacy, security and monitoring
BOR 1303.1 User responsibilities – employees
BOR 1303.2 Internet services – employees
BOR 1303.3 Electronic mail – employee
BOR 1304.1 User responsibilities – students
BOR 1304.2 Internet services – students
BOR 1304.3 Electronic mail – students
BOR 1305.1 User responsibilities – patrons
BOR 1306 Logging on and off computer resources
BOR 1307 Internet reporting
BOR 1308 Disposal of computer storage devices

Board of Regents policies with IT implications

BOR 203.6 Prohibition against conducting board business via electronic mail
BOR 303.7 Distributed learning
BOR 401.3 Copyright policy
BOR 406 Ownership of electronic course material
BOR 901.1 Renewal and/or replacement of equipment in recharge centers
BOR 920.1 IT and telecommunication equipment and contracts; purchase or procurement
BOR 940.23 Computer fee
BOR 1901.1 Unauthorized copying and use of computer software
BOR 1909 Competition with the private sector

University of Montana Policies

University of Montana IT policies are limited and in flux. Those policies without links are under editorial review. This inventory organizes UM policies in four categories:

UM IT-specific policies – 500 range

UM 501 Domain names
UM 502 Telecommunications Infrastructure (previously know as Port splitters and mini hubs)
UM 503 Student web space
UM 504 Web servers
UM 505 Web standards

UM policies with IT implications

UM 201.1 Building construction, renovation, repair, remodeling and maintenance
UM 202.6 Emergency Response
UM 307 Electronic communication devices and services
UM 706 Health Insurance Portability and Accountability Act (HIPAA)

UM IT policies approved in principle/under editorial review

UM TBD Establishing and implementing Information Technology policies and standards
UM TBD Email capture, archival and retrieval
UM TBD Email
UM TBD IT Purchase of network equipment (pending final editing)

UM IT policies under consideration

UM Mass electronic communication
UM Wireless access
UM General IT Security
UM Accounts and Passwords (Identity Management)
UM Network Monitoring and Reporting
UM Data Security
UM Workstation, portable computer and PDA security
UM Minimum security standards for systems and servers
UM Protecting sensitive digital research data

Other units’ operational practices with IT implications

Library patrons rights and responsibilities
Library Copyright guidelines for reserve materials collection
Library Faculty web policy
Registrar Use of high-tech classrooms




Montana Tech IT Policies

Acceptable Use Statement (Summary)

Users shall not purposely engage in activity with the intent to: harass other users; degrade the performance of systems; deprive an authorized Montana Tech user access to a Montana Tech resource; obtain extra resources, beyond those allocated; circumvent Montana Tech computer security measures or gain access to a Montana Tech system for which proper authorization has not been given.

For complete detailed information please refer to the link below:

Acceptable use Statement full version
 

Abuse Statement (Summary)

The use of computers or network systems in the College setting in no way exempts any member from the normal requirements of ethical or legal behavior.  Use of a computer and network system that is shared by many users imposes certain additional obligations.  Each member of the community is responsible for his/her actions whether or not rules are built in, and whether or not they can be circumvented.  Refer to the document below for more discussion.

For complete detailed information please refer to the link below:

Abuse Statement full version

Abuse Policy (Summary)

The following document describes the limitations on authorized use of the computers and network systems provided by Montana Tech.

In addition to the limitations described in this document, you are also required to follow the policies, procedures, and statements governing acceptable use of the specific computers and network systems to which you are given access by Montana Tech.  Violations of any of the policies or documents mentioned here should be presumed to violate the Montana Tech of The University of Montana Policy Regarding Abuse of Computers and Network Systems and, hence, the Montana Tech Campus Code of Conduct and the Code of Academic Integrity.

For complete detailed information please refer to the link below:

Abuse Policy full version

 

Software Piracy:  What You Should Know

Whether you call it borrowing, copying, sharing or "fair use", software piracy is illegal and puts Montana Tech's students, faculty and staff, as well as the college itself, at risk for legal action.  Following are questions and answers relating to software piracy.

For complete detailed information please refer to the link below:

Software Piracy full version

 

Incident Handling Procedure (Summary)

This document provides some general guidelines and procedures for dealing with computer security incidents.  The document is meant to provide Montana Tech support personnel with some guidelines on what to do if they discover a security incident.

For complete detailed information please refer to the link below:

Incident Handling Procedure full version
 

Escalation Procedures for Security Incidents (Summary)

This procedure describes the steps, which are taken for physical, and computer security incidents that occur within the Montana Tech facility.

For complete detailed information please refer to the link below:

Escalation Procedures full version

 

Network Connection Policy (Summary)

This policy describes the requirements and constraints for attaching a computer to the Montana Tech local area network (LAN).  All devices connected o the Montana Tech network must meet minimum-security requirements.

The intent of this policy is to ensure that all systems installed on the Montana Tech network are maintained at appropriate levels of security while at the same time not impeding the ability of Montana Tech users and support staff to perform their work.

Secured and unsecured systems are discussed.  For detailed information please refer to the link below:

For complete detailed information please refer to the link below:

Network Connection Policy
 

Special Access Guidelines Agreement (Summary)

This agreement outlines the many do's and do not's of using special access accounts.  Special access is defined as having the privilege and password to use domain administrator accounts.

For complete detailed information please refer to the link below:

Special Access Guidelines full version
 

Special Access Policy (Summary)

This policy provides a set of requirements for the regulation of special access use on the Montana Tech Computer System.  This policy will provide a mechanism for the addition and removal of people from the special access status and a mechanism for periodic reviews of the special access status.

 For complete detailed information please refer to the link below:

Special Access Policy full version

Support Staff Guidelines (Summary)

This document establishes computer usage guidelines for the Montana Tech support staff in the course of their job duties on the Montana Tech Campus Computer Systems.  These guidelines are intended to protect the rights and privacy of Montana Tech clients as well as those of the Montana Tech support staff.

For complete detailed information please refer to the link below:

Support Staff Guidelines full version
 

Changing Computer and Network Policies

It is recognized the policies contained herein are subject to change as technology, campus mission and organization, and economic priorities advance.  To ensure that these policies are kept up to date and reflect current needs, this statement of policy is necessary.

For complete detailed information please refer to the link below:

Changing Computer and Network Policy full version




16 DC110011 ONTARIO MUNICIPAL BOARD COMMISSION DES
19 February 2016 Hawaii Historic Places Review Board
3 BIELD BOARD OF MANAGEMENT THURSDAY 19


Tags: board of, conducting board, board, policies, regents, comprise