Policy

advertisement
Policy
Effective Date
2/17/2013
Date of Last Revision
2/17/2013
Chapter Name
4.0 Information Management
Chapter Number
Title
4.11
Dormant Accounts Policy
1.0 Purpose
In order to reduce security risk, licensing costs and operational complexity, the Division of Information Technology
may disable or remove accounts that are deemed to be unused or dormant over a long period of time.
2.0 Scope
This policy applies to all EMU managed computer system access accounts.
3.0 Policy
The Division of Information Technology may review account access and usage data for any or all accounts managed
by the University. Where practical and reasonable, the Division may implement procedures to lock and/or remove
access to accounts that are unused, abandoned or dormant.
This action may be taken in any case where locking a dormant account reduces security risk, reduces licensing costs
or simplifies operational complexity.
Any account(s) removed under this policy may be re-created or restored upon request by the legitimate account
owner if that account owner remains otherwise eligible to use the account(s).
4.0 Responsibility for Implementation
The Director of Network and System Services shall have the responsibility and authority to cause this policy to be
implemented and maintained.
5.0 Enforcement
Any employee found to violate federal or State of Michigan laws, EMU policies, procedures or standards of
conduct, will be subject to disciplinary action under University policy. Any student found to violate federal or State
of Michigan laws, EMU policies, procedures or standards of conduct, will be subject to disciplinary action under
EMU’s Student Code of Conduct. Any suspected violation of state or federal laws will be reported to the appropriate
legal authority for investigation.
The University reserves the right to protect its electronic resources from threats of immediate harm. This may
include activities such as disconnecting an offending computer system from the campus network, terminating a
running job on a computer system, or taking other action.
6.0 Definitions
Term
IT Policy
Form Version 3.0
Definition
Page 1 of 2
7.0 Revision History
Description
RJenkins-Submittal Draft
Approved by CIO
IT Policy
Approval Date
09/17/2012
2/17/2013
Page 2 of 2
Download