Procedure

advertisement
Procedure
Effective Date
October 19, 2011
Date of Last Revision
July 12, 2015
Chapter Name
Information Management
Chapter Number
Title
4.8.P.12
Access Control - Voluntary/Involuntary Termination of Student Employees
or Graduate Assistants
1.0 Purpose
The purpose of this procedure is to document the responsibilities and tasks associated with termination of system
and network access as a result of employment termination for student employees or graduate assistants.
This procedure is initiated only at the request of the supervisor of student employees or graduate assistants, or the
request of a senior administrator. If the student is transferring to another department, it is the responsibility of the
student’s new supervisor to request any required access for the new role.
2.0 Governing Policy
Number/Document Name
15.2 Information Technology Security and Confidentiality (University Policy)
4.8 EMU System Accounts
Effective Date
09/17/1996
09/30/2008
3.0 Procedure
I.T. Security recommends that supervisors refer to the “Employment Separation or Transfer Checklist for System
Access” on the I.T. Forms Library web page to be sure that all access control items are addressed for each
employment termination.
Supervisor of terminated student employee or graduate assistant:
1) Send an Email to it-security@list2.emich.edu with the following information:
a) Date and time that access is to be removed
b) Name of student employee
c) EID and NetID of student employee
d) Note whether the individual is a graduate assistant or student employee.
Security Team:
2) Delivers request to all account managers for all systems requesting that all access is removed except for
standard access to systems such as email that remains available to all students.
3) System administrators remove all relevant privileges in all systems and notify security team of completion.
4) Security team marks request as complete.
4.0 Responsibility for Implementation
Director in charge of IT Security is responsible for the implementation of this procedure.
IT Procedure
Form Version 3.0
Page 1 of 2
5.0 Definitions
Term
Access Control
Definition
Tasks performed by hardware, software, and administrative controls to monitor a
system operation, ensure data integrity, perform user identification, record system
access and changes, and grant access to users.
NetID, EID
System identifiers used to gain access into specific systems.
Student Employee
Includes any person who is working at EMU while they are currently enrolled as
a graduate or undergraduate student and employment rules are provided by Career
Services.
6.0 Revision History
Description
Initial Draft
Updated
Approved by Policy Committee
Approved by CIO
Updated IT Security Draft – 02/26/2015
Policy Committee– 1st review
Policy Committee – Approval
Approved by CIO
IT Procedure
Approval Date
August 1, 2006
March 20, 2014
March 25, 2014
April 30, 2015
July 9, 2015
July 12, 2015
Page 2 of 2
Download