Additional Computer Network User Responsibilities
Computer Services--Additional Computer Network User Responsibilities
Policy
________________________________________
Document Number: HR--148 Revision #: 1.0
Document Owner: Executive VP Date Last Updated: 08/17/2012
Primary Author: Director of Information Technology Status: Approved
Date Originally Created: 01/17/2012
________________________________________
General Description
Description: Information about additional computer network user responsibilities.
Purpose: Delineation of policy.
Scope: All faculty, staff, students, and administrators
Responsibility: Director of IT
Human Resources
VP of Business and Finance
________________________________________
Requirements
Relevant Knowledge: In order to comply with this policy you should know:
Current University policy
Terms and Definitions: Additional training
Corrective Action
________________________________________
Policy Provisions
1. Additional Computer Network User Responsibilities
The user of a Cumberland University owned/administered network capable computer also assumes responsibility to:
1. Prevent to the best of one's ability any physical damage to the stand-alone computer and any related devices.
2. Provide an appropriate location for the computer.
3. Report in a timely and appropriate manner to the Office of Information Technology any problem or any unauthorized use of the computer and related equipment. Report forms may be obtained on the Cumberland University intranet
4. Allow only University authorized personnel to access and/or modify University supplied computer hardware, software, and/or intellectual property. Authorized personnel include Cumberland University faculty needing to perform University related tasks on the computer and/or related equipment. Authentication of authorized personnel and/or work may be obtained from the Office of Information Technology.
5. Learn to use the University supplied computer software to the fullest extent possible. Users are expected to attend University sponsored training sessions and to use University approved computer applications to the fullest extent possible on a regular basis.
________________________________________
Performance Evaluation
Performance Metrics: Compliance with standard policy and procedure
Consequences: Further training
Loss of privileges
________________________________________
Subject Experts
The following may be consulted for additional information.
Director of Human Resources
Director of Information Technology
VP of Business and Finance