Information Technology

Computer Usage Policy

An individual's use of computing resources in a university environment is not an absolute, personal right; rather it is a privilege conditional on the individual's compliance with federal and state laws, institutional policy, and generally acceptable use protocols. The Computer Usage Policy defines what constitutes acceptable and unacceptable use of Kennesaw State University (KSU) computing facilities and resources. In using the computing resources of KSU the user agrees to abide by all applicable University policies and procedures as well as all applicable local, state, and federal laws. KSU reserves the right to review any accounts and files created on University resources. Per the University System of Georgia's Appropriate Use Policy, individuals are held accountable for any misuse of their assigned network identification (NetID), computer system, and network access.

Effective Date: 
Monday, Nov 21 2016

Data Security Policy

This policy defines the usage and security requirements of sensitive data at Kennesaw State University (KSU). The purpose of this policy is to provide guidance for appropriate usage and security of sensitive information at KSU and is essential for compliance with federal, state, and the University System of Georgia regulations. This policy sets forth this institution’s standards with regard to the handling of sensitive institutional data and serves as the consumer data and privacy policy for KSU.

Effective Date: 
Monday, Nov 21 2016

Email Usage Policy

This policy details the appropriate use of Kennesaw State University Electronic Mail (email) accounts and service. End-user and administrative responsibilities are outlined as they relate to the use of email as a communication medium for University business.

Effective Date: 
Monday, Nov 21 2016

Enterprise Information Security Policy

This policy serves to establish the minimum information security practices for Kennesaw State University technology resources, devices, and associated communication. This policy is intended to provide direction on University security practices designed to ensure the confidentiality, integrity, and availability of University information.  

Effective Date: 
Monday, Nov 21 2016

Incident Response Policy

The Kennesaw State University (KSU) Information Security Incident Response Policy establishes responsibilities associated with the coordination of the University’s information technology (IT) incident response. The policy is necessary in order to ensure the timely remediation of campus IT incidents as well as in post-incident information gathering and reporting of infrastructure-affecting and security-related events. This policy is aligned with the University System of Georgia's requirement that KSU establish an internal capability for handling security incidents.

Effective Date: 
Monday, Nov 21 2016

Network Access Policy

This policy covers the use of Kennesaw State University’s wireless and wired network access, and provides guidance for appropriate usage of wireless and wired resources available to the Kennesaw State University community. This policy supports the free and open exchange of information and the provision of technology to advance the educational purposes for the University’s students, faculty, and staff while also protecting data confidentiality and integrity.

Effective Date: 
Monday, Nov 21 2016

New Server Policy

Servers at Kennesaw State University play an important role in the delivery of critical data to students, faculty, staff, and the public. To this end, safeguards must be in place to protect the confidentiality, integrity, and availability of the data housed on these servers. Technical, managerial, and operational safeguards work together to assure that new servers are installed and configured in such a manner to emphasize security and minimize service disruptions. These requirements are outlined in this policy and collectively define the University’s required server base configuration.

Effective Date: 
Monday, Nov 21 2016

Open Computer Lab and Technology Classroom Policy

This policy defines usage requirements for Kennesaw State University open computer labs and technology classrooms. Through the utilization of the safeguards described herein, these classrooms and labs support the mission of the University while also protecting the physical and logical assets contained therein.

Effective Date: 
Monday, Nov 21 2016

Technology Purchasing, Relocation, and Surplus Policy

The Board of Regents of the University System of Georgia requires that Kennesaw State University's Chief Information Officer, or his/her designee, approve all computer hardware/software purchases or audio-visual purchases. This policy details the appropriate methods of acquisition to minimize the risks of exposing electronic data to individuals unauthorized to view this data and transferring software to those not licensed to use it. This policy is essential to the inventory of KSU technology assets and the appropriate destruction of storage media and is essential to compliance with state and federal data privacy statutes and software licensing agreements.

Effective Date: 
Monday, Nov 21 2016

Telephone and Fax Usage Policy

This policy covers the appropriate/official use of telephone and fax lines and services in order to control costs to Kennesaw State University.

Effective Date: 
Monday, Nov 21 2016

Pages

Subscribe to Information Technology