Policy

advertisement
Policy
Effective Date
February 10, 2014
Date of Last Revision
February 10, 2014
Chapter Name
Network Management
Chapter Number
Title
6.7
Network and Server Management
1.0 Purpose
The Division of Information Technology is responsible for managing the network and server resources that deliver
the information technologies utilized in the operation and management of the University. This policy assigns
responsibility for the operation and management of the technology infrastructure to the Division of Information
Technology.
2.0 Scope
This policy covers all networks, servers and systems that make up the University’s technology infrastructure. This
policy applies to all individuals who use this infrastructure.
3.0 Policy
The Division of IT shall create procedures, standards and guidelines, as required, to effectively operate, administer
or manage the network, servers and related systems.
Scarce resources will be allocated using strategic or mission based justification. DoIT leadership will review and
approve such requests within the context of other known university strategic priorities.
DoIT reserves all rights to take whatever action is necessary to protect the infrastructure. As examples, such action
could include disconnecting a server infected by a virus, disconnecting the network to a building where a worm
infection is rapidly spreading and could spread to other buildings or disconnecting any workstation/server that is
scanning or infecting other systems on the EMU network.
4.0 Responsibility for Implementation
The Director of Network and Systems Services is responsible for implementing this policy.
5.0 Enforcement
Any employee found to violate federal or State of Michigan laws, EMU policies, procedures or standards of
conduct, will be subject to disciplinary action under University policy. Any student found to violate federal or State
of Michigan laws, EMU policies, procedures or standards of conduct, will be subject to disciplinary action under
EMU’s Student Code of Conduct. Any suspected violation of state or federal laws will be reported to the appropriate
legal authority for investigation.
The University reserves the right to protect its electronic resources from threats of immediate harm. This may
include activities such as disconnecting an offending computer system from the campus network, terminating a
running job on a computer system, or taking other action.
6.0 Definitions
Term
IT Policy
Form Version 3.0
Definition
Page 1 of 2
7.0 Revision History
Description
Initial Draft – Policy Committee
CIO
IT Policy
Approval Date
May 6, 2013
February 10, 2014
Page 2 of 2
Download