Policy Effective Date 2/17/2013 Date of Last Revision 2/17/2013 Chapter Name 4.0 Information Management Chapter Number Title 4.11 Dormant Accounts Policy 1.0 Purpose In order to reduce security risk, licensing costs and operational complexity, the Division of Information Technology may disable or remove accounts that are deemed to be unused or dormant over a long period of time. 2.0 Scope This policy applies to all EMU managed computer system access accounts. 3.0 Policy The Division of Information Technology may review account access and usage data for any or all accounts managed by the University. Where practical and reasonable, the Division may implement procedures to lock and/or remove access to accounts that are unused, abandoned or dormant. This action may be taken in any case where locking a dormant account reduces security risk, reduces licensing costs or simplifies operational complexity. Any account(s) removed under this policy may be re-created or restored upon request by the legitimate account owner if that account owner remains otherwise eligible to use the account(s). 4.0 Responsibility for Implementation The Director of Network and System Services shall have the responsibility and authority to cause this policy to be implemented and maintained. 5.0 Enforcement Any employee found to violate federal or State of Michigan laws, EMU policies, procedures or standards of conduct, will be subject to disciplinary action under University policy. Any student found to violate federal or State of Michigan laws, EMU policies, procedures or standards of conduct, will be subject to disciplinary action under EMU’s Student Code of Conduct. Any suspected violation of state or federal laws will be reported to the appropriate legal authority for investigation. The University reserves the right to protect its electronic resources from threats of immediate harm. This may include activities such as disconnecting an offending computer system from the campus network, terminating a running job on a computer system, or taking other action. 6.0 Definitions Term IT Policy Form Version 3.0 Definition Page 1 of 2 7.0 Revision History Description RJenkins-Submittal Draft Approved by CIO IT Policy Approval Date 09/17/2012 2/17/2013 Page 2 of 2