Description: The purpose of this policy is to provide guidelines for the use of the academic computing labs by employees and students of the university, as well as other authorized users and groups.
Owner: Strategic Operations
Description: The purpose of this policy is to establish parameters for the use of Longwood IT resources and systems.
Owner: Strategic Operations
Description: The purpose of this policy is to identify the requirements for granting, maintaining and terminating users' access to university information technology (IT) resources and systems.
Owner: Strategic Operations
Description: The purpose of this policy is to ensure that the person supplying an identity is the person to whom the supplied identity has been assigned.
Owner: Strategic Operations
Description: The purpose of this policy is to establish a rule for loan debt status when a student dies.
Owner: Strategic Operations
Description: The purpose of this policy is to describe those financial aid programs in which Longwood University has agreed to participate.
Owner: Strategic Operations
Description: The purpose of this policy is to identify a central administrative unit responsible for coordinating all federal, state, institutional, and other financial aid in accordance with federal regulations.
Owner: Strategic Operations
Description: The purpose of this policy is to identify how the sensitivity of the university's data will be classified.
Owner: Strategic Operations
Description: The purpose of this policy is to ensure e-mail communication is used in a way that supports the university's mission.
Owner: Strategic Operations
Description: The primary purpose of this policy is to protect restricted data, as defined by the Data Classification Policy, by limiting the use of encryption to those algorithms that have received substantial public review and have been proven to work effectively while setting standards for all use of encryption, and to identify federal exportation regulations regarding encryption technologies.
Owner: Strategic Operations
Description: This policy provides the configuration, maintenance, control and monitoring of enterprise-wide firewall technology used to safeguard the university's information technology (IT) resources and systems.
Owner: Strategic Operations
Description: The purpose of the policy is to ensure compliance with FOIA and outline procedures for responding to FOIA requests.
Owner: Strategic Operations
Description: The intent of this policy is to establish the requirements for effective incident reporting, response, and escalation practices with regard to the security of data and information technology (IT) resources and systems.
Owner: Strategic Operations
Description: This policy is established to support the Longwood University community in promoting equal access opportunity to Information Technology (IT) by the application of accessibility standards, guidelines, training, tools and methods consistent with higher education. The aim is to provide this opportunity in a setting that fosters independence and meets the guidelines of the Americans with Disability Act (ADA) and the Rehabilitation Act of 1973. This policy sets forth accessibility standards and guidelines that reflect best practices for achieving the accessibility of IT for use by persons with disabilities.
Owner: Strategic Operations
Description: It is critically important that Longwood University's Information Technology (IT) infrastructure, architecture and ongoing operations support the mission of the institution. To help ensure this need is met, decisions affecting these areas must reflect standards, guidelines and practices found to be effective in the higher education environment. This policy establishes the nationally recognized codes of practice with which the university aligns its IT infrastructure, architecture and ongoing operations.
Owner: Strategic Operations
Description: Longwood University is committed to continually improving the delivery of Information Technology (IT) solutions within budget, on schedule, within scope and in such a way as to best contribute to accomplishing the university's mission and strategic plans. This policy furthers that goal by establishing the common and consistent application of project management best practices in the management of IT projects.
Owner: Strategic Operations
Description: The purpose of this policy is to ensure that all Longwood University information technology (IT) resource and system procurement decisions are guided by the technology procurement principles of effectiveness and efficiency, including a thorough consideration of factors such as support needs, compatibility, security and budget maximization in all IT resource and system procurement decisions.
Owner: Strategic Operations
Description: To prevent the use of the institution's name and/or logo in an unauthorized manner.
Owner: Strategic Operations
Description: The purpose of this policy is to establish a University wide information technology (IT) systems development life cycle to offer consistency and structure to the IT systems development process and to ensure that security is considered throughout an IT system's development.
Owner: Strategic Operations
Description: Malware: Malware, short for malicious software, is any software designed to damage, disrupt, harm or compromise any computer, server or network. Viruses, worms, trojans, rootkits, bots, and spyware are all various forms of malware.
Owner: Strategic Operations
Description: The purpose of this policy is to ensure that all official printed publications portray a positive, consistent and coordinated image of the university.
Owner: Strategic Operations
Description: Effective password management is the most central single element in assuring the overall security of Longwood's information technology (IT) resources and systems and the protection of University data. The purpose of this policy is to ensure that all users are aware of their responsibilities in effective password management and to ensure that appropriate password standards are applied to all University IT systems
Owner: Strategic Operations
Description: The purpose of this policy is to establish authority for the institution to award performance scholarships.
Owner: Strategic Operations
Description: The purpose of this policy is to establish the rules for the granting, control, monitoring and removal of physical access to Longwood information technology resources and systems facilities. These facilities include areas containing sensitive data and telecommunications equipment.
Owner: Strategic Operations
Description: The purpose of this policy is to establish a single, authoritative source of release of information about Longwood-related newsworthy information to the public and the media.
Owner: Strategic Operations
Description: The purpose of this policy is to define the minimum requirements for eligible employees to use university-owned and non-university-owned computing devices for remote access.
Owner: Strategic Operations
Description: The purpose of this policy is to identify the conditions necessary to provide information technology system users with appropriate awareness of system security requirements and of their responsibilities to protect information technology resources and systems.
Owner: Strategic Operations
Description: The purpose of this policy is to establish university-wide security roles with assigned responsibilities for protecting university data and information technology (IT) systems.
Owner: Strategic Operations
Description: To establish policies and guidelines which govern students called to active military duty during a national emergency.
Owner: Strategic Operations
Description: This policy regulates the use and management of voice, fax and cellular services provided to employees of Longwood University..
Owner: Strategic Operations
Description: Longwood University has a highly complex and resource-rich Information Technology (IT) environment upon which there is increasing reliance to provide mission-critical academic, instructional and administrative functions. Safeguarding the institution's computing assets in the face of growing security threats is a significant challenge requiring a strong, persistent and coordinated program that leverages widely accepted, effective security practices appropriate for the higher education environment. This policy states the codes of practice with which the university aligns its IT security program.
Owner: Strategic Operations
Description: The purpose of this policy is to identify the requirements that wireless communications technology must meet to provide the University with reliable and secure wireless services.
Owner: Strategic Operations
Description: The purpose of this policy is to establish responsible maximum weekly hours that eligible students may work under the Federal Work Study Program.
Owner: Strategic Operations