Procedure Effective Date October 19, 2011 Date of Last Revision July 12, 2015 Chapter Name Information Management Chapter Number Title 4.8.P.12 Access Control - Voluntary/Involuntary Termination of Student Employees or Graduate Assistants 1.0 Purpose The purpose of this procedure is to document the responsibilities and tasks associated with termination of system and network access as a result of employment termination for student employees or graduate assistants. This procedure is initiated only at the request of the supervisor of student employees or graduate assistants, or the request of a senior administrator. If the student is transferring to another department, it is the responsibility of the student’s new supervisor to request any required access for the new role. 2.0 Governing Policy Number/Document Name 15.2 Information Technology Security and Confidentiality (University Policy) 4.8 EMU System Accounts Effective Date 09/17/1996 09/30/2008 3.0 Procedure I.T. Security recommends that supervisors refer to the “Employment Separation or Transfer Checklist for System Access” on the I.T. Forms Library web page to be sure that all access control items are addressed for each employment termination. Supervisor of terminated student employee or graduate assistant: 1) Send an Email to it-security@list2.emich.edu with the following information: a) Date and time that access is to be removed b) Name of student employee c) EID and NetID of student employee d) Note whether the individual is a graduate assistant or student employee. Security Team: 2) Delivers request to all account managers for all systems requesting that all access is removed except for standard access to systems such as email that remains available to all students. 3) System administrators remove all relevant privileges in all systems and notify security team of completion. 4) Security team marks request as complete. 4.0 Responsibility for Implementation Director in charge of IT Security is responsible for the implementation of this procedure. IT Procedure Form Version 3.0 Page 1 of 2 5.0 Definitions Term Access Control Definition Tasks performed by hardware, software, and administrative controls to monitor a system operation, ensure data integrity, perform user identification, record system access and changes, and grant access to users. NetID, EID System identifiers used to gain access into specific systems. Student Employee Includes any person who is working at EMU while they are currently enrolled as a graduate or undergraduate student and employment rules are provided by Career Services. 6.0 Revision History Description Initial Draft Updated Approved by Policy Committee Approved by CIO Updated IT Security Draft – 02/26/2015 Policy Committee– 1st review Policy Committee – Approval Approved by CIO IT Procedure Approval Date August 1, 2006 March 20, 2014 March 25, 2014 April 30, 2015 July 9, 2015 July 12, 2015 Page 2 of 2