Information Technology

Computer Usage Policy

An individual's use of computing resources in a university environment is not an absolute, personal right; rather it is a privilege conditional on the individual's compliance with federal and state laws, institutional policy, and generally acceptable use protocols. The Computer Usage Policy defines what constitutes acceptable and unacceptable use of Kennesaw State University (KSU or the University) computing facilities and resources. In using the computing resources of KSU, the user agrees to abide by all applicable University policies and procedures, and all applicable local, state, and federal laws. KSU reserves the right to review any accounts and files created on University resources. Per the University System of Georgia (USG) Appropriate Use Policy, individuals are held accountable for any misuse of their assigned network identification (NetID), computer system, and network access.

Effective Date: 
Thursday, Jun 14 2018

Data Security Policy

This policy defines the usage and security requirements of confidential and sensitive data at Kennesaw State University (KSU or the University). The purpose of this policy is to provide guidance for appropriate usage and security of confidential and sensitive information at KSU and is essential for compliance with federal, state, and University System of Georgia (USG) regulations. This policy sets forth this institution’s standards with regard to the handling of confidential and sensitive institutional data and serves as the consumer data and privacy policy for the University.

Effective Date: 
Thursday, Jun 14 2018

Email and Instant Messaging Usage Policy

This policy details the appropriate use of Kennesaw State University Electronic Mail (email) and Instant Messaging (IM) accounts and service. End-user and administrative responsibilities are outlined as they relate to the use of email as a communication medium for University business.

Effective Date: 
Thursday, Jun 14 2018

Enterprise Information Security Policy

This policy serves to establish the minimum information security practices for Kennesaw State University technology resources, devices, and associated communication. This policy is intended to provide direction on University security practices designed to ensure the confidentiality, integrity, and availability of campus information.

Effective Date: 
Thursday, Jun 14 2018

Incident Response Policy

The Kennesaw State University (KSU or the University) Information Security Incident Response Policy establishes responsibilities associated with the coordination of the University’s information technology (IT) incident response. The policy is necessary in order to ensure the timely remediation of campus IT incidents as well as in post-incident information gathering and reporting of infrastructure-affecting and security-related events. This policy is aligned with the University System of Georgia’s (USG) requirement that KSU establish an internal capability for handling security incidents.

Effective Date: 
Thursday, Jun 14 2018

Network Access Policy

This policy covers the use of Kennesaw State University’s wireless and wired network access and provides guidance for appropriate usage of wireless and wired resources available to the Kennesaw State University (KSU or the University) community. This policy supports the free and open exchange of information and the provision of technology to advance the educational mission of the University while also protecting data confidentiality and integrity.

In support of the KSU mission, the Office of the CIO is the sole provider of network resources for the KSU community.

Effective Date: 
Thursday, Jun 14 2018

New Server Policy

Servers at Kennesaw State University (KSU or the University) play an important role in the delivery of critical data to students, faculty, staff, and the public. To this end, safeguards must be in place to protect the confidentiality, integrity, and availability of the data housed on these servers. Technical, managerial, and operational safeguards work together to assure that new servers are installed, configured, and managed in such a manner to maximize security and minimize service disruptions. These requirements establish the minimum security configuration for University servers.

Effective Date: 
Thursday, Jun 14 2018

Open Computer Lab and Classroom Technology Policy

This policy defines usage requirements for Kennesaw State University (KSU or the University) open computer labs and technology classrooms. Through the utilization of the safeguards described herein, these classrooms and labs support the mission of the University while also protecting the physical and logical assets contained therein.

Effective Date: 
Thursday, Jun 14 2018

Technology Purchasing, Relocation, and Surplus Policy

The Board of Regents of the University System of Georgia requires that Kennesaw State University's Chief Information Officer, or his/her designee, approve all computer hardware/software purchases or audio-visual purchases. This policy details the appropriate methods of acquisition to minimize the risks of exposing electronic data to individuals unauthorized to view this data and transferring software to those not licensed to use it. This policy is essential to the inventory of KSU technology assets and the appropriate destruction of storage media and is essential to compliance with state and federal data privacy statutes and software licensing agreements.

Effective Date: 
Monday, Nov 21 2016

Telephone and Fax Usage Policy

This policy covers the appropriate use of telephone and fax lines and services in order to control costs for Kennesaw State University (KSU or the University).

Effective Date: 
Thursday, Jun 14 2018

Pages

Subscribe to Information Technology