Policy Effective Date February 10, 2014 Date of Last Revision February 10, 2014 Chapter Name Network Management Chapter Number Title 6.7 Network and Server Management 1.0 Purpose The Division of Information Technology is responsible for managing the network and server resources that deliver the information technologies utilized in the operation and management of the University. This policy assigns responsibility for the operation and management of the technology infrastructure to the Division of Information Technology. 2.0 Scope This policy covers all networks, servers and systems that make up the University’s technology infrastructure. This policy applies to all individuals who use this infrastructure. 3.0 Policy The Division of IT shall create procedures, standards and guidelines, as required, to effectively operate, administer or manage the network, servers and related systems. Scarce resources will be allocated using strategic or mission based justification. DoIT leadership will review and approve such requests within the context of other known university strategic priorities. DoIT reserves all rights to take whatever action is necessary to protect the infrastructure. As examples, such action could include disconnecting a server infected by a virus, disconnecting the network to a building where a worm infection is rapidly spreading and could spread to other buildings or disconnecting any workstation/server that is scanning or infecting other systems on the EMU network. 4.0 Responsibility for Implementation The Director of Network and Systems Services is responsible for implementing this policy. 5.0 Enforcement Any employee found to violate federal or State of Michigan laws, EMU policies, procedures or standards of conduct, will be subject to disciplinary action under University policy. Any student found to violate federal or State of Michigan laws, EMU policies, procedures or standards of conduct, will be subject to disciplinary action under EMU’s Student Code of Conduct. Any suspected violation of state or federal laws will be reported to the appropriate legal authority for investigation. The University reserves the right to protect its electronic resources from threats of immediate harm. This may include activities such as disconnecting an offending computer system from the campus network, terminating a running job on a computer system, or taking other action. 6.0 Definitions Term IT Policy Form Version 3.0 Definition Page 1 of 2 7.0 Revision History Description Initial Draft – Policy Committee CIO IT Policy Approval Date May 6, 2013 February 10, 2014 Page 2 of 2