• shuTechSidebar
Information Technology

All Policies and Procedures

Title and Description GLOBALKEYWORDS Title

Account Generation Processes

User accounts that provide access to various IT resources are created and maintained by the Department of Information Technology to support the academic and administrative work of members of the University community.

account,generation,IT,information technology,banner,email,office 365,office365,piratenet,blackboardAccount Generation Processes

Appropriate Use Policy

Seton Hall has an appropriate use policy which governs the use of IT resources on campus.

appropriate use,enforcement,principles,rights of access,user expectations,user responsibilitiesAppropriate Use Policy

Blackboard Course Site Retention Policy

The policy for Blackboard Course Site Retention.

blackboard,course,policy,procedures,retention,siteBlackboard Course Site Retention Policy

Broadcast Email Guidelines

Seton Hall has created the following e-mail guidelines to govern the use of the University e-mail system.

account,announcements,broadcasts,e-mail,guidelines,hoaxes,violationsBroadcast Email Guidelines

Campus Email Use Guidelines

This policy outlines the processes used to create, maintain and delete user accounts on Seton Hall University's email systems.

policy,use,email,guidelines,accounts,technology,employees,faculty,students,alumniCampus Email Use Guidelines

Computer Lab Software Installation Policy

This policy outlines the process for installing new software applications in the public computer labs.

computer lab,software installationComputer Lab Software Installation Policy

Computer Viruses and Malware Policy

The purpose of this policy is to protect Seton Hall University technology resources and data against intrusion by viruses and other malware.

computing,information technology,it,malware,virus,security,computer,network,antivirusComputer Viruses and Malware Policy

Data Classification Security Policy

Any person who uses, stores or accesses data contained in the University’s technology systems has the responsibility to safeguard that data.

data,security,information technology,policy,classification,privacyData Classification Security Policy

Email Archiving (ArchiveOne) Policies and Procedures

This policy covers the procedures for using the University's C2C ArchiveOne e-mail archiving system.

e-mail,archive,mailbox,it,technologyEmail Archiving (ArchiveOne) Policies and Procedures

Faculty Laptop Distribution

The faculty laptop distribution policy provides information for faculty on how to scheduling a distribution appointment.

distribution,doIT,faculty,laptop,laptop distribution,pc support,pcssFaculty Laptop Distribution

Faculty Laptop Refresh

The faculty laptop refresh policy describes faculty eligibility to upgrade their current computer to the latest model.

doIT,faculty,laptop refresh,pc support,pcss,upgradeFaculty Laptop Refresh

Faculty Participation in Mobile Computing

There are several faculty specific policies that govern participation in the Mobile Computing Program.

Mobile Computing,Policies,administrators,employees,faculty,refresh,repairsFaculty Participation in Mobile Computing

Laptop Image Software Installation Policy

This policy outlines the process for evaluating, procuring, and installing new software for the laptop image.

installation,laptop software image,procurement,software application,testingLaptop Image Software Installation Policy

Loaner Laptop Guidelines

This policy governs governs the use of the loaner laptops available through the TLTC Loaner Pool.

TLTC,guidelines,loanerLoaner Laptop Guidelines

Mobile Computing - Student Participation Policies

There are several student specific policies that govern participation in the Mobile Computing Program.

Mobile Computing,Policies,check-in,fees,fines,refresh,repairsMobile Computing - Student Participation Policies

Password Policy, Standards and Guidelines

In order to protect both your and the University’s information and resources, the Department of Information Technology has formulated password standards and guidelines.

authentication,doIT,information technology,password,security,security information security,strong password,technology,verificationPassword Policy, Standards and Guidelines

Policy on Confidential Information

Seton Hall University employees who have been given access to confidential information, have a resonsibility to protect this sensitive and personal data.

data,confidentiality,access,information technology,banner,personal,financial academicPolicy on Confidential Information

Public Computer Lab Guidelines

The following is a list of guidelines that govern the use of the Public Computer Labs.

guidelines,pcss,public labPublic Computer Lab Guidelines

Public Lab Reservation Policy

This policy outlines the terms and conditions for using a public lab as a teaching or meeting space.

policy,public lab,reservationPublic Lab Reservation Policy

Remote Access (VPN) Policy

This policy applies to all SHU, employees, contractors, consultants, temporary employees, and all personnel affiliated with third party employers utilizing the VPN to access the SHU Network.

it,information technology,vpn,networkRemote Access (VPN) Policy

Screening Room Use

Guidelines for use of the Screening Room in Fahy Hall 203B.

film,foreign,language,movie,screening roomScreening Room Use

Separation of Duties within Information Systems

Separation of duties is one tool used to ensure the integrity and security of the University’s data and information systems.

policy,it,information systems,computer,technology,duties,security,data,integrity,hipaaSeparation of Duties within Information Systems

Student Participation in Mobile Computing

All full-time undergraduate students, graduate students in select programs, and faculty participate in Mobile Computing.

Mobile Computing,adjunct faculty,faculty,graduate assistants,graduate students,laptops,participation,undergraduate studentsStudent Participation in Mobile Computing

Student Technology Assistant (STA) Policy

The following policies pertain to students who participate in the Student Technology Assistant Program.

Policies,STA mission,TLT Center,TLTC,pc support,pcss,policy,professional conduct,responsibility,staStudent Technology Assistant (STA) Policy

Technology Purchase Procedures

University IT Services has established guidelines and procedures for all technology purchases.

IT,technology,purchase,equipment,software,computers,wireless,devices,network,servers,peripherals,printer,hubTechnology Purchase Procedures

University Policy Regarding Mobile Devices Accessing Campus Network Services

University employees may wish to access campus network services such as email using their mobile device.

policy,it,information technology,mobile,network,access,securityUniversity Policy Regarding Mobile Devices Accessing Campus Network Services
Contact Us

Department of Information Technology
(973) 275-2222
servicedesk@shu.edu
Corrigan Hall

Sign In to PirateNet