Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Policy

Georgia Southern University

2010

Articles 1 - 3 of 3

Full-Text Articles in Entire DC Network

Acceptable Use Policy (Aup) Nov 2010

Acceptable Use Policy (Aup)

Information Technology Services

This policy establishes that Georgia Southern University (University) and its users have an obligation to abide by standards that support the appropriate and ethical use of University resources. The use of these resources is a privilege granted by Georgia Southern University to authorized users only. The policy is not intended to be exhaustive, and the University reserves the right to limit, restrict, or extend privileges and access to its information technology resources.


Protection And Security Of Data And Information Oct 2010

Protection And Security Of Data And Information

Information Technology Services

Data and information are valuable assets owned by the University. The Board of Regents of the University System of Georgia Business Procedures Manual establishes that all institutional data is to be used with appropriate and relevant levels of access and with sufficient assurance of its security and integrity in compliance with existing laws, rules and regulations. As such, each institution has a responsibility to protect the confidentiality, integrity, and availability of data and information generated, accessed, modified, transmitted, stored or used by the University, any medium on which the data resides and regardless of format.


Information Technology Procurement - It-0200-00 Jan 2010

Information Technology Procurement - It-0200-00

Information Technology Services

The purpose of this policy is to ensure that the procurement of information Technology hardware, software, and services follow established University System of Georgia Board of Regents policies and guidelines, that due diligence is performed to ensure compatibility with existing systems and policies, that appropriate plans are associated with technology acquisition, and that the approval of the Chief Information Officer is obtained prior to issuance of a purchase order.