Acceptable Use of Technology

Scope and Purpose This Technology Acceptable Use Policy is intended to inform users of the guidelines and standards governing use of technology belonging to St. Mary’s University. It does not provide a comprehensive guide to federal or state laws that may otherwise...

Account Provisioning and Retention

This policy outlines the criteria for the creation, deletion and retention of university issued email accounts and network services account access. St. Mary’s University provided email accounts through Microsoft Office 365 include email, calendaring, SharePoint,...

Data Center Access

Introduction The IS Data Centers provide stable environments, enhanced security, equipment and alarms, uninterrupted power (UPS and generators), high-speed network connectivity, and other features required by the mission-critical resources they contain. The policies...

Data Server Backup

Summary The purpose of this document is to outline the IS departments backup policy for the computer systems in use by St. Mary’s University. The policy described within this document follows industry standards for providing Disaster Recovery capabilities for...

Information Resources Acquisition

The offices of the Vice President of Information Services (VPIS) are charged with assessing, procuring, implementing and maintaining information resources in support of the St. Mary’s University mission. The Information Resources Acquisition policy establishes...

Information Security Plan

Summary The Information Security Plan was created to allow Information Services the ability to create a foundation of information security for the St. Mary’s University community. Purpose The purpose of the Information Security Plan (ISP) is to establish a framework...

Information Services Systems Change Management

Purpose Change management refers to a formal process for making changes to IS (Information Services) services or systems. The goal of change management is to increase awareness and understanding of proposed changes across an organization and ensure that all changes...

Passwords

Purpose The purpose of this policy is to establish a standard for the creation of strong passwords, the protection of those passwords, and the frequency of change. Scope Assigning unique user logins and requiring password protection is one of several primary...

Third Party Vendor Access

Summary Third party entities play an important role in the support of hardware and software management, and operations for the University. When properly authorized they can remotely view, copy, and modify data and audit logs; they correct software and operating system...

VPN Access

Summary A Virtual Private Network (VPN) provides a secure encrypted network connection over the Internet between authorized St. Mary’s University users and the University internal network. VPN offers secure access for faculty and staff who need access to information...
Back to top