Information Technology Policies
Not sure what you may and may not do with your university owned computing systems? Read through this policy to see how you can stay in bounds while using your computer. This policy also provides example of misuse so you can stay on the right path.
Because Regent University provides all employees and students with an Electronic Mail (Email) address, we expect our users to abide by this policy. Within it, you will learn what is permissible and what sort of activity you should avoid. It's true you do have significant leeway when it comes to using your Regent Email account. However, this policy will give you a better perspective regarding appropriate use. Reading and understanding this policy sets you on the right path for sending and receiving Email with your Regent account.
We are all familiar with Instant Messaging clients like AOL IM, MSN Messenger, and Yahoo! Messenger. That doesn't necessarily mean that we are all free to use these applications while at the university. There are some guidelines we must adhere to while using these kinds of tools. To get a more clear understanding of how we can use these items within the rules, read through this Instant Messaging Policy. By following the rules, we keep Regent information safe and maintain personal privacy.
So you bring your own laptop to the university? You've got temps, contractors, or visitors coming? Be sure you are familiar with the rules that govern who and what may attach to the university's private networks. We provide a robust wired and wireless public access network for all to use. Make sure that you're following the guidelines and procedures we recommend so you don't expose our private network to unnecessary security risks.
The Internet has become a revolutionary tool with regard to social networking and there is no shortage of online brokers that offer a place for all to share information about themselves and become more acquainted with others. Unfortunately, there are predatory individuals on the Internet as well and these persons present a real danger to others. For this reason, Regent University offers this notice in an effort to educate its users of the dangers of such information sharing.
Within Regent University there are numerous organizations. Some organizations desire to develop an Internet presense to inform the community of their events and dealings. Regent University has established a policy for hosting such organizational websites within the university network. If your organization desires to establish a website within our network, please review this policy.
More information about password requirements and secrecy guidelines. We can't stress the importance of your password. It's the only thing that separates an intruder from your personal account information. If you're a faculty or staff at Regent, there's even more on the line. If an intruder were to compromise your account, it could lead to FERPA violations, HIPAA violations, or other legislative infractions. Learn how to prevent these pitfalls by reading this policy.
Peer to Peer programs are bandwidth hogs and most people don't even know they have these programs installed. Most peer to peer programs share out copyrighted music and movies which is against the law. This policy breaks down our rules and regulations to protect you and the University.
Regent University provides remote access to internal systems for faculty and staff only. If your employment requires remote access be sure to review this policy so that you do not place our information assets in undue risk. Please note that there are geographical limitations to our remote access.
Data, data, and more data!!!! Have you tried to open a file in Word and you can't find it because you accidentally deleted it. We have tried to layout a policy that illustrates the backup restore procedures for the university. Continuously backing up data at the university is key to our business. Please read the Restore Policy to understand the details and procedures for recovering your data, files or emails.