Policy

Secure Use of Computers

Computer Services--Secure Use of Computers
Policy

________________________________________
Document Number: HR--140 Revision #: 1.0
Document Owner: Executive VP Date Last Updated: 08/17/2012
Primary Author: Director of Information Technology Status: Approved
Date Originally Created: 01/17/2012
________________________________________
General Description
Description: Information about secure use of computers relative to HR policy.

Purpose: Delineation of policy.

Scope: All faculty, staff, students, and administrators

Responsibility: Director of IT
Human Resources
VP of Business and Finance
________________________________________
Requirements
Relevant Knowledge: In order to comply with this policy you should know:
Current University policy
Terms and Definitions: Additional training

Corrective Action

Loss of privilege, general
________________________________________
Policy Provisions
1. Secure Use of Computers

Users of Cumberland computer resources are responsible for the correct and sufficient use of the tools available for maintaining the security of information stored on each stand-alone computer and/or computer system. While ultimate responsibility for resolution of problems related to the invasion of the user's privacy or loss of data rests with the user, a reasonable effort will by made by Cumberland to lessen the impact of such loss or damage. Users are responsible for observing the following precautions:

1. Computer accounts, passwords, and other types of authorization that are assigned to individual users are not to be shared with others.
2. The user must assign an obscure alphanumeric account password of at least six (6) characters and numbers. Passwords must be changed frequently.
3. The user must understand the level of protection each computer system automatically applies to files and supplement, if necessary, for sensitive information.
4. The user must make regular backups of important data and other essential information to network server.
5. The user must be aware of computer viruses and other destructive programs and take steps to avoid being a victim or unwitting distributor of these processes. User may not disable or uninstall University approved virus protection software.
6. The user should be aware that Cumberland computing resources, including software such as electronic mail, are not necessarily secure or private. Users should not use University email for sensitive personal correspondence.



________________________________________
Performance Evaluation
Performance Metrics: Compliance with standard policy and procedure

Consequences: Further training
Loss of privileges
________________________________________
Subject Experts
The following may be consulted for additional information.
Director of Human Resources

Director of Information Technology

VP of Business and Finance