Computer, Mobile Device, and Data Encryption Security
The Stephen M. Ross School of Business at the University of Michigan ("Ross") requires that all individuals accessing any University information resources abide by these security policies established for desktop computers, laptop computers, and other forms of mobile devices, such as cell phones, portable media and others as they evolve. With the increasing use of personal computers and portable devices at the University, there is a growing risk that security vulnerabilities could expose private and confidential data to theft and exploitation. This policy defines a number of safe computing standards to provide protection.
Policy - Computer Data Encyption.pdf
Policy - Computer and Mobile Device Security.pdf
Computer Power Management
The Stephen M. Ross School of Business at the University of Michigan ("Ross") has established computer power settings to achieve energy cost savings across the enterprise for all managed desktop and laptop computers. Power management is a feature of computers, monitors, printers and copiers that turns off the power or switches the system to a low-power state when inactive in order to save energy. Power management becomes even more important across an enterprise such as Ross due to the significant amount of energy being used the costs associated with that energy use.
Policy - Computer Power Management.pdf
Connecting Devices to the Network
The Stephen M. Ross School of Business at the University of Michigan ("Ross") has expended great effort to create a high-performance network environment that is robust, secure and convenient for all members of the community. A computer network is a shared resource in any organization. Decisions about how best to administer and extend network services need to be based on the needs of the entire community. As more consumer devices become network aware, such as wireless printers, dual-mode cell phones, portable media and others as they evolve, they have the potential to disrupt and degrade a computer network. This policy defines the types of devices members of the Ross community can connect to the network.
Policy - Connecting Devices Network.pdf
Network and Systems Administration
The Stephen M. Ross School of Business at the University of Michigan ("Ross") outlines responsibilities, guidelines and standards of conduct for all individuals who function as network or systems administrators. Network and Systems Administrator ("Administrators") are individuals who perform any network/system administration duties and/or technical support of network/systems that are accessed by other people, systems, or services. Administrators represent the shared interests of Ross and the entire University of Michigan community in informing and protecting on all appropriate matters pertinent to their responsibilities.
Policy - Network Systems Administration.pdf
Security Incident Response
The Stephen M. Ross School of Business at the University of Michigan ("Ross") has established a security incident response plan to correspond with and complement University plans for Information Security Policy (SPG 601.27) and Information Security Incident Reporting (SPG 601.25). The plan includes components to assist the entire community being more aware of the nature of security incidents; establishes technology standards for devices to ensure compliance; and ensures that incidents, when known, are reported to the Information Technology Security Services (ITSS) campus group and locally monitored until resolution.
Policy - Security Incident Response.pdf
Use of Recordings of Course Presentations
The Stephen M. Ross School of Business at the University of Michigan ("Ross") may create, store and re-use audio and video recordings of classroom presentations and similar academic events. When recordings are made of course presentations in any medium, and those recordings are viewed, shared or distributed, the use must be conducted in a way that ensures compliance with University and copyright policies; protects the integrity and quality of the teaching and learning experience; and protects the interests of the University, the course instructor, and students. This policy is intended to protect, and not restrict, the core academic values of course presentations.
Policy - Use of Course Recordings.pdf
Classroom Support Service Level Agreement
Computing Services and the Operations Office agree to work together to provide full support for classroom technology directly related to the technical readiness of the room and associated equipment.