- User accounts that provide access to various IT resources are created and maintained by the Department of Information Technology to support the academic and administrative work of members of the University community.
|account,generation,IT,information technology,banner,email,office 365,office365,piratenet,blackboard||Account Generation Processes|
- Seton Hall has an appropriate use policy which governs the use of IT resources on campus.
|appropriate use,enforcement,principles,rights of access,user expectations,user responsibilities||Appropriate Use Policy|
- The policy for Blackboard Course Site Retention.
|blackboard,course,policy,procedures,retention,site||Blackboard Course Site Retention Policy|
- Seton Hall has created the following e-mail guidelines to govern the use of the University e-mail system.
|account,announcements,broadcasts,e-mail,guidelines,hoaxes,violations||Broadcast Email Guidelines|
- This policy outlines the processes used to create, maintain and delete user accounts on Seton Hall University's email systems.
|policy,use,email,guidelines,accounts,technology,employees,faculty,students,alumni||Campus Email Use Guidelines|
- This policy outlines the process for installing new software applications in the public computer labs.
|computer lab,software installation||Computer Lab Software Installation Policy|
- The purpose of this policy is to protect Seton Hall University technology resources and data against intrusion by viruses and other malware.
|computing,information technology,it,malware,virus,security,computer,network,antivirus||Computer Viruses and Malware Policy|
- Seton Hall University employees who have been given access to confidential information, have a resonsibility to protect this sensitive and personal data.
|data,confidentiality,access,information technology,banner,personal,financial academic||Confidentiality Agreement|
- Any person who uses, stores or accesses data contained in the University’s technology systems has the responsibility to safeguard that data.
|data,security,information technology,policy,classification,privacy||Data Classification Security Policy|
- This policy covers the procedures for using the University's C2C ArchiveOne e-mail archiving system.
|e-mail,archive,mailbox,it,technology||Email Archiving (ArchiveOne) Policies and Procedures|
- The faculty laptop distribution policy provides information for faculty on how to scheduling a distribution appointment.
|distribution,doIT,faculty,laptop,laptop distribution,pc support,pcss||Faculty Laptop Distribution|
- The faculty laptop refresh policy describes faculty eligibility to upgrade their current computer to the latest model.
|doIT,faculty,laptop refresh,pc support,pcss,upgrade||Faculty Laptop Refresh|
- There are several faculty specific policies that govern participation in the Mobile Computing Program.
|Mobile Computing,Policies,administrators,employees,faculty,refresh,repairs||Faculty Participation in Mobile Computing|
- This policy outlines the process for evaluating, procuring, and installing new software for the laptop image.
|installation,laptop software image,procurement,software application,testing||Laptop Image Software Installation Policy|
- This policy governs governs the use of the loaner laptops available through the TLTC Loaner Pool.
|TLTC,guidelines,loaner||Loaner Laptop Guidelines|
- There are several student specific policies that govern participation in the Mobile Computing Program.
|Mobile Computing,Policies,check-in,fees,fines,refresh,repairs||Mobile Computing - Student Participation Policies|
- In order to protect both your and the University’s information and resources, the Department of Information Technology has formulated password standards and guidelines.
|authentication,doIT,information technology,password,security,security information security,strong password,technology,verification||Password Policy, Standards and Guidelines|
- The following is a list of guidelines that govern the use of the Public Computer Labs.
|guidelines,pcss,public lab||Public Computer Lab Guidelines|
- This policy outlines the terms and conditions for using a public lab as a teaching or meeting space.
|policy,public lab,reservation||Public Lab Reservation Policy|
- This policy applies to all SHU, employees, contractors, consultants, temporary employees, and all personnel affiliated with third party employers utilizing the VPN to access the SHU Network.
|it,information technology,vpn,network||Remote Access (VPN) Policy|
- Guidelines for use of the Screening Room in Fahy Hall 203B.
|film,foreign,language,movie,screening room||Screening Room Use|
- Separation of duties is one tool used to ensure the integrity and security of the University’s data and information systems.
|policy,it,information systems,computer,technology,duties,security,data,integrity,hipaa||Separation of Duties within Information Systems|
- All full-time undergraduate students, graduate students in select programs, and faculty participate in Mobile Computing.
|Mobile Computing,adjunct faculty,faculty,graduate assistants,graduate students,laptops,participation,undergraduate students||Student Participation in Mobile Computing|
- The following policies pertain to students who participate in the Student Technology Assistant Program.
|Policies,STA mission,TLT Center,TLTC,pc support,pcss,policy,professional conduct,responsibility,sta||Student Technology Assistant (STA) Policy|
- University IT Services has established guidelines and procedures for all technology purchases.
|IT,technology,purchase,equipment,software,computers,wireless,devices,network,servers,peripherals,printer,hub||Technology Purchase Procedures|
- University employees may wish to access campus network services such as email using their mobile device.
|policy,it,information technology,mobile,network,access,security||University Policy Regarding Mobile Devices Accessing Campus Network Services|