X hits on this document

PDF document

This policy has four purposes: - page 4 / 5

9 views

0 shares

0 downloads

0 comments

4 / 5

  • This section of the policy applies only to computers located in Olin 207 or the Great Oaks Hall public computer lab

  • Faculty members who need non-standard applications loaded on the lab computer image must bring an installation CD to the Help Center at least six weeks before they need the application on the machine.

  • Faculty members who need non-standard applications loaded on five or fewer lab computers must bring an installation CD to the Help Center at least two weeks before they need the application on the machine.

  • In either case, along with the installation CD, we must have evidence of licensing to install the software on an individual computer.

  • IT will follow the procedure below in the event that a user has compromised security precautions that have been installed on his or her machine.

    • o

      IT staff will examine the machine to confirm that there actually is a security problem

      • o

        In the case there is a problem, IT staff will inform users of the importance of security on the machine and advise them of ways they can avoid compromising the security feature again.

      • o

        IT staff also may install computer security software to monitor for and/or prevent users from making inappropriate changes to their computers.

      • o

        With authorization from the Vice President of Technology and the user’s supervisor, IT staff may monitor a user’s activity for attempts to change settings or circumvent computer security.

      • o

        In the cases of repeated situations in which a user compromises security precautions on a Wofford-owned computer, IT will notify the user’s supervisor for appropriate disciplinary action.

      • o

        If the behavior persists, IT will remove the user’s machine.

  • IT will follow the following procedure in the event that a user has improperly configured application software to the extent that it is unusable.

      • o

        IT staff will reinstall the basic software (OS and standard applications) that was on the computer when it was originally placed in service

      • o

        In the case of repeated incidences of improperly configured application software, IT will no longer furnish technical support to that user for this software.

Computer Management Policy Last updated: 18 July 2008

4

Wofford College

Document info
Document views9
Page views9
Page last viewedSat Dec 03 04:52:28 UTC 2016
Pages5
Paragraphs158
Words1653

Comments