IT Guidelines and Policies
For Current Faculty and Staff Associate Dean for Research, Outreach, and Technology
Instructors giving lectures and a wide shot of the cyclethon banner

Skip to content. | Skip to navigation

Sections
 
Ed Home For Current Faculty and Staff Associate Dean for Research, Outreach, and Technology Technology IT Guidelines and Policies
IT Guidelines and Policies

IT Guidelines and Policies

College of Education Information Technology Guidelines and Policies

9/23/10

 

1.  Web Site Development

Guidelines have been drafted and reviewed by the Faculty Council.  The guidelines are currently posted on our Internal Web Site under the College Policies heading.

The relevant guidelines and policies can be found here.

2.  Administrative Rights to Local Machines

Penn State is encouraging all units to operate local computers with the lowest level of administrative privilege consistent with performing necessary functions.  When machines with higher levels of administrative privilege are compromised by hackers, the potential for damage to the network is much greater.  For this reason the University is encouraging units to operate their machines with the least level of administrative privilege necessary.

Most users have little or no need of higher levels of administrative privilege to do their work, but there may be instances where higher levels of privilege are needed on either a temporary or more permanent basis.  The College’s default practice will be to configure all computers connecting to the Penn State network with one local user account for the use of the individual (i.e., without administrative privilege).  If an individual user wishes to have administrative privilege, a request should be completed and submitted to the Associate Dean for Research, Outreach, and Technology for review. Please note this policy option is for faculty only.

Please submit your request to the CETC help desk ticket system

The administrative guidelines and policies can be found here.

3.  Establishing Accounts on Computers

Before you were given a Penn State access account you signed an agreement to abide by the university’s  “Acceptable Use Policy” which describes prohibited activities like sending spam, trying to sell things, etc. Upon gaining access to the Penn State network, users will be required to log in, and will be reminded of their commitment to comply with University IT policies.

One aspect of acceptable use is not storing any personally identifiable information (like Social Security numbers, credit card numbers, etc).  Users will be asked to run software that will help them identify and remove such information, and you will be expected to periodically scan computers for such information.

The relevant password guidelines and policies can be found here.

The relevant acceptable use policy can be found here.

4. Internal Security Documentation

The college has developed guidelines and policies covering disaster tolerance.

The relevant guidelines and policies can be found here.

5
http://www.ed.psu.edu/educ/for-current-faculty-and-staff/outreach-office/technology/technology-guidelines/document_view
http://www.ed.psu.edu/educ/for-current-faculty-and-staff/outreach-office/technology/technology-guidelines
http://www.ed.psu.edu/educ/for-current-faculty-and-staff/outreach-office/technology
http://www.ed.psu.edu/educ/for-current-faculty-and-staff/outreach-office
http://www.ed.psu.edu/educ/for-current-faculty-and-staff
http://www.ed.psu.edu
http://www.ed.psu.edu/educ
http://www.ed.psu.edu/educ/for-current-faculty-and-staff
http://www.ed.psu.edu/educ/for-current-faculty-and-staff/outreach-office