Policies and Procedures Manual

Chapter 4: Business & Administration

04:08:00   Computer Resources

This policy describes the computing resources and services available to students, faculty, and staff at Northeast State and defines the responsibilities of the office of Information Technology in providing these resources and services, as well as the responsibilities of the user community.

  1. Purpose: The purpose of the office of Information Technology is to provide timely, quality technical services and training that are accessible and relevant to the needs of the faculty, staff, and students. The objective is to facilitate, promote, and encourage the use of computing resources as a tool by providing easy access to information required by the user community to carry out their day-to-day business. In addition, the office will promote the highest degree of security possible to ensure the confidentiality and integrity of this information. 
  2. Services: The office of Information Technology is responsible for providing a variety of computerized services which includes, but is not limited to, the following:
    1. Maintenance of main campus network
    2. Maintenance of applicable extended campus networks
    3. Installation and maintenance of computer hardware and software
    4. Development of new systems/computing services
    5. Modification of existing systems/computing services
    6. Responding to requests for special information
    7. Maintenance of existing systems/computing services
    8. Recommending new hardware and software 
  3. Responsibilities: The office of Information Technology has the responsibility to:
    1. Establish and support reasonable standards of security for electronic information that college members produce, use, or distribute and ensure the privacy and accuracy of administrative information that the College maintains;
    2. Protect college computers, networks, and information from destruction, tampering, and unauthorized inspection and/or use;
    3. Ensure that information technology resources are used to support activities connected with instruction and administration;
    4. Delineate the limits of privacy that can be expected in the use of networked computer resources and preserve freedom of expression over this medium without countenancing abuse or unlawful activities;
    5. Ensure that college computer systems do not lose important information because of hardware, software, or administrative failures or breakdowns. To achieve this objective, authorized systems or technical managers may occasionally need to examine the contents of particular files to diagnose or solve problems;
    6. Communicate college policies and individuals' responsibilities systematically and regularly in a variety of formats to all parts of the college community;
    7. Monitor policies and propose changes in policy as events or technology warrant;
    8. Manage computing resources so that members of the college community benefit equitably from their use. To achieve this, authorized staff may occasionally need to restrict inequitable use of shared systems or of the network. For example, the College reserves the right to require users to refrain from using any program that is unduly resource intensive; and
    9. Enforce policies by restricting access in case of serious violations. For example, in appropriate circumstances, the director of Computer Services may find it necessary to lock a user's account. In such circumstances, if a student's account is involved, the student must receive approval from the vice president for Academic Affairs prior to having the account reactivated. If an employee’s account is involved, the director of Computer Services must receive approval from the Executive Director of Human Resources & Organizational Effectiveness prior to having the account reactivated.


Back to Top

Divisional Review Responsibilities Checklist: Information Technology

Revision History: October 2002, February 2016