Academic Computing Labs Policy 6001

Description: The purpose of this policy is to provide guidelines for the use of the academic computing labs by employees and students of the university, as well as other authorized users and groups.

Owner: Strategic Operations


Acceptable Use of Information Technology Resources and Systems 6002

Description: The purpose of this policy is to establish parameters for the use of Longwood IT resources and systems.

Owner: Strategic Operations


Access to Information Technology Resources and Systems 6003

Description: The purpose of this policy is to identify the requirements for granting, maintaining and terminating users' access to university information technology (IT) resources and systems.

Owner: Strategic Operations


Authentication 6005

Description: The purpose of this policy is to ensure that the person supplying an identity is the person to whom the supplied identity has been assigned.

Owner: Strategic Operations


Cancellation of Loan Debt 6006

Description: The purpose of this policy is to establish a rule for loan debt status when a student dies.

Owner: Strategic Operations


Compliance with State and Federal Regulations 6007

Description: The purpose of this policy is to describe those financial aid programs in which Longwood University has agreed to participate.

Owner: Strategic Operations


Coordination of Financial Aid

Description: The purpose of this policy is to identify a central administrative unit responsible for coordinating all federal, state, institutional, and other financial aid in accordance with federal regulations.

Owner: Strategic Operations


Data Classification 6009

Description: The purpose of this policy is to identify how the sensitivity of the university's data will be classified.

Owner: Strategic Operations


eMail 6010

Description: The purpose of this policy is to ensure e-mail communication is used in a way that supports the university's mission.

Owner: Strategic Operations


Encryption 6011

Description: The primary purpose of this policy is to protect restricted data, as defined by the Data Classification Policy, by limiting the use of encryption to those algorithms that have received substantial public review and have been proven to work effectively while setting standards for all use of encryption, and to identify federal exportation regulations regarding encryption technologies.

Owner: Strategic Operations


Firewall Policy 6012

Description: This policy provides the configuration, maintenance, control and monitoring of enterprise-wide firewall technology used to safeguard the university's information technology (IT) resources and systems.

Owner: Strategic Operations


Freedom of Information Act (FOIA) 6013

Description: The purpose of the policy is to ensure compliance with FOIA and outline procedures for responding to FOIA requests.

Owner: Strategic Operations


Incident Response 6014

Description: The intent of this policy is to establish the requirements for effective incident reporting, response, and escalation practices with regard to the security of data and information technology (IT) resources and systems.

Owner: Strategic Operations


Information Technology Accessibility 6015

Description: This policy is established to support the Longwood University community in promoting equal access opportunity to Information Technology (IT) by the application of accessibility standards, guidelines, training, tools and methods consistent with higher education. The aim is to provide this opportunity in a setting that fosters independence and meets the guidelines of the Americans with Disability Act (ADA) and the Rehabilitation Act of 1973. This policy sets forth accessibility standards and guidelines that reflect best practices for achieving the accessibility of IT for use by persons with disabilities.

Owner: Strategic Operations


Information Technology and Infrastructure, Architecture and Ongoing Operations 6016

Description: It is critically important that Longwood University's Information Technology (IT) infrastructure, architecture and ongoing operations support the mission of the institution. To help ensure this need is met, decisions affecting these areas must reflect standards, guidelines and practices found to be effective in the higher education environment. This policy establishes the nationally recognized codes of practice with which the university aligns its IT infrastructure, architecture and ongoing operations.

Owner: Strategic Operations


Information Technology Project Management 6017

Description: Longwood University is committed to continually improving the delivery of Information Technology (IT) solutions within budget, on schedule, within scope and in such a way as to best contribute to accomplishing the university's mission and strategic plans. This policy furthers that goal by establishing the common and consistent application of project management best practices in the management of IT projects.

Owner: Strategic Operations


Information Technology Resources and Systems Procurement 6018

Description: The purpose of this policy is to ensure that all Longwood University information technology (IT) resource and system procurement decisions are guided by the technology procurement principles of effectiveness and efficiency, including a thorough consideration of factors such as support needs, compatibility, security and budget maximization in all IT resource and system procurement decisions.

Owner: Strategic Operations


Institutional Name/Logo 6019

Description: To prevent the use of the institution's name and/or logo in an unauthorized manner.

Owner: Strategic Operations


IT Systems Development Lifecycle 6020

Description: The purpose of this policy is to establish a University wide information technology (IT) systems development life cycle to offer consistency and structure to the IT systems development process and to ensure that security is considered throughout an IT system's development.

Owner: Strategic Operations


Malware Protection 6021

Description: Malware: Malware, short for malicious software, is any software designed to damage, disrupt, harm or compromise any computer, server or network. Viruses, worms, trojans, rootkits, bots, and spyware are all various forms of malware.

Owner: Strategic Operations


Official Printed Publications 6022

Description: The purpose of this policy is to ensure that all official printed publications portray a positive, consistent and coordinated image of the university.

Owner: Strategic Operations


Password Management 6023

Description: Effective password management is the most central single element in assuring the overall security of Longwood's information technology (IT) resources and systems and the protection of University data. The purpose of this policy is to ensure that all users are aware of their responsibilities in effective password management and to ensure that appropriate password standards are applied to all University IT systems

Owner: Strategic Operations


Performance Scholarships

Description: The purpose of this policy is to establish authority for the institution to award performance scholarships.

Owner: Strategic Operations


Physical Access 6024

Description: The purpose of this policy is to establish the rules for the granting, control, monitoring and removal of physical access to Longwood information technology resources and systems facilities. These facilities include areas containing sensitive data and telecommunications equipment.

Owner: Strategic Operations


Release of Information Concerning Longwood University 6025

Description: The purpose of this policy is to establish a single, authoritative source of release of information about Longwood-related newsworthy information to the public and the media.

Owner: Strategic Operations


Remote Access 6026

Description: The purpose of this policy is to define the minimum requirements for eligible employees to use university-owned and non-university-owned computing devices for remote access.

Owner: Strategic Operations


Security Awareness and Training 6028

Description: The purpose of this policy is to identify the conditions necessary to provide information technology system users with appropriate awareness of system security requirements and of their responsibilities to protect information technology resources and systems.

Owner: Strategic Operations


Security Roles and Responsibilities 6029

Description: The purpose of this policy is to establish university-wide security roles with assigned responsibilities for protecting university data and information technology (IT) systems.

Owner: Strategic Operations


Student Military Mobilization 6031

Description: To establish policies and guidelines which govern students called to active military duty during a national emergency.

Owner: Strategic Operations


Telecommunications 6032

Description: This policy regulates the use and management of voice, fax and cellular services provided to employees of Longwood University..

Owner: Strategic Operations


University Information Technology Security Program 6033

Description: Longwood University has a highly complex and resource-rich Information Technology (IT) environment upon which there is increasing reliance to provide mission-critical academic, instructional and administrative functions. Safeguarding the institution's computing assets in the face of growing security threats is a significant challenge requiring a strong, persistent and coordinated program that leverages widely accepted, effective security practices appropriate for the higher education environment. This policy states the codes of practice with which the university aligns its IT security program.

Owner: Strategic Operations


Wireless Communication 6034

Description: The purpose of this policy is to identify the requirements that wireless communications technology must meet to provide the University with reliable and secure wireless services.

Owner: Strategic Operations


Work Study 6035

Description: The purpose of this policy is to establish responsible maximum weekly hours that eligible students may work under the Federal Work Study Program.

Owner: Strategic Operations