www.archive-edu-2013.com » EDU » N » NORTHWOOD

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".

    Archived pages: 3 . Archive date: 2013-09.

  • Title: Northwood University SSL VPN
    Descriptive info: .. Your browser is executing scripts on this page.. If this message persists, please make sure that you are visiting a correct site and JavaSript support is enabled in your browser, and then try again.. Welcome to the.. Northwood University SSL VPN.. Username.. Password.. Please Note: By logging into this system, users agree to abide by all provisions of the current.. Acceptable Use Policy.. and.. Security  ...   click Read Policy to review them.. The SSL VPN is intended for faculty and staff to securely access resources which are only available via the campus network.. If you have questions or problems with this system please see either of the links below.. SSL VPN Instructions.. SSL VPN FAQ.. If you need assistance with this system please contact the Help Desk at 989-837-4421 during normal business hours..

    Original link path: /dana-na/auth/url_default/welcome.cgi
    Open archive

  • Title: Northwood University - Information Technology Acceptable Use Policy
    Descriptive info: INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY.. Document Number:.. IT-POL-1.. Audience:.. Students, Faculty and Staff.. Effective Date:.. August 20, 2003.. Revision Date:.. August 20, 2007.. Author(s):.. Bob Wisler, Director of Information Technology.. Approved By:.. Northwood University Officers.. Document Security:.. Public -.. www.. northwood.. edu/aup/.. SCOPE.. This policy applies to all of the Northwood University community including students, faculty, administrators, staff, contract employees, and those who may be granted a guest computer account on a request basis.. For purposes of this policy, Northwood systems include all computers and software owned by the University, any communications hardware and software provided by the University for the purpose of accessing its computers, and any computer network governed in part or whole by the University.. Any member of the community who violates this policy is subject to disciplinary action as stated in this policy, and possible legal action under Federal Electronic Communication Acts.. In addition, the.. University community is bound by the Northwood.. Code of Ethics.. in the use of computer resources.. DESCRIPTION.. Northwood University's computing resources are provided for educational and academic purposes.. Use of Northwood systems and all resources to which they are connected is a privilege, not a right.. Northwood systems are a resource provided by the University as an educational tool to exchange information more efficiently.. The Information Technology Department manages the resources for the mutual benefit of all.. Computing resources include labs used for general computing, computer classrooms used for instructional purposes, facilities required to maintain operations, and any computer that is connected to the Northwood network.. Access to these systems and resources is a privilege granted to the University community.. Users must conduct computing activities in a responsible manner, respecting the rights of other computer users and respecting all copyright and computing license agreements.. All computing and networking resources should be used in an efficient, ethical, and legal manner.. This policy applies to all computer systems regardless of their operating system, manufacturer, or network connectivity.. Northwood University operates various network, academic, and administrative systems in support of its academic mission and business function.. These systems are maintained and operationally controlled by the Northwood University Information Technology Department.. As used in this policy, the term "user" refers to any person consuming technology resource.. The term "Information Technology staff" refers to the full-time professional staff reporting to the corporate Director of Information Technology.. The term "Northwood systems" refers to computing and associated systems or resources operated by Northwood University.. Information in electronic format, whether stored on computers or removable media, is to be considered Northwood University property.. This policy provides a general description of what is expected of users.. It is not intended to be an exhaustive list of all allowed/forbidden activities, but rather a guideline for the ethical use of the Northwood computing environment.. Users should read the appropriate campus Computer Lab Rules Procedures posted in each computer lab for additional information and supplemental policies pertaining to the classroom or lab environment.. VIOLATIONS.. Any violations of Northwood policies may result in disciplinary action up to and including termination or expulsion.. If necessary, the University will advise appropriate legal officials of any illegal activities.. NETWORK, INTERNET AND E-MAIL.. Access to the Northwood network, Internet and e-mail system is provided to students and employees for the benefit of the organization and its customers.. To ensure that all students and employees are responsible Internet users and to protect the University's public image, the following guidelines have been established.. Acceptable Use.. Students and employees accessing the Internet and e-mail through the Northwood system are representing the University.. Both employees and students are responsible for seeing that the Internet is used in an effective, ethical and lawful manner.. Responsibilities include:.. The content of all text, audio, or images placed or sent over the Internet, e-mail and instant message programs.. All messages communicated should have the user's name attached.. No messages will be transmitted under an assumed name.. Users may not attempt to obscure origin of any message.. Information published on the Internet should not violate or infringe upon the rights of others.. No abusive, profane or offensive language should be transmitted through the system.. Unacceptable Use.. Students and employees must not use the Network, Internet or e-mail for purposes that are illegal, unethical or harmful to the University.. Examples of unacceptable use are as follows:.. Personal gain or advancement of individual or political views.. Solicitation of non-University business, or any use of the Internet for personal gain, is strictly prohibited.. Privacy intrusions such as reading other user's e-mail, using accounts other than their own (including ID or password "cracking"), reading or deleting unprotected files, etc.. Data stored in electronic format is to be considered real property.. Network connections may not be used for the purposes of making unauthorized connections to, breaking into, or adversely affecting the performance of other systems on the network, whether these systems are University-owned or not.. Users must not disrupt the operation of the University network or the networks of other users.. Internet and e-mail use must not interfere with employee productivity.. No messages with derogatory or inflammatory remarks about an individual or group's race, religion, national origin, physical attributes, or sexual preference will be transmitted.. Access to, or distribution of, sexually explicit or defamatory content is strictly prohibited.. In the event that these items are accessed at no fault of your own, or in the attempt to end future inappropriate communications or usage, accessing these items are not a violation of the Acceptable Use Policy.. Spam, unsolicited bulk e-mail, including mass-mailings/forwarding, and chain letters.. Use of Northwood University generated distribution lists is permitted only when explicitly authorized by Information Technology.. Access to these lists will be granted on a case-by-case basis.. Non-Northwood Owned Network Devices:.. Without specific authorization by the Network Administrator, users must not physically or electronically attach any foreign networking device to the Northwood University network.. This includes, but may not be limited to routers, switches, hubs, wireless access points, and any device that may provide DHCP services.. Violation of this policy may result in the immediate suspension of Northwood University network connectivity privileges.. Electronic Communications Policy.. E-mail is the standard, and sometimes preferred, means of internal communication at the University.. The University will consider employees and students to be duly informed and in receipt of notifications and correspondences sent by an administrator, staff, or faculty member delivered to an employee's or a student's Northwood e-mail account.. It is recommended that employees and students frequently access their Northwood e-mail account for official information.. All full-time and part-time faculty and staff, including active adjunct instructors, are expected to regularly check their Northwood e-mail account, and to acknowledge messages in a timely manner.. Employees are expected to use the automated out-of-office notification functions in e-mail and voicemail when they are away from the office for an extended period.. ADMINISTRATIVE SYSTEMS.. Northwood University, to provide services to its constituents, records a large amount of extremely confidential data, transmits the information over extensive networks, and stores the information on numerous computing systems.. Any breach in the security of these systems or networks could disrupt the University and/or allow such confidential information to be transmitted quickly, silently and without geographic or constituency limits.. Recognizing these vulnerabilities and the need for institutions to limit access to such information, the Federal Government has passed numerous laws concerning personal information.. As a result, the University must comply with a complex array of legislation including, but not limited to, FERPA.. Failure to comply with legislation can have significant adverse consequences on the University.. The University is the ultimate owner of all Institutional Data (information relating to the administration of the University).. All Institutional Data are considered confidential and are intended exclusively for purposes related to the University's programs.. All Institutional Data and administrative systems should be used only for the legitimate business of the University and not for commercial, personal and/or political purposes.. Administrative Systems Accounts Management.. Requests for access to Institutional Data, including maintenance  ...   not be written down, stored on personal computer drives, or given to others.. Passwords should not be given out to someone claiming to be an Information Technology staff member; authorized Information Technology members have full access privileges and do not need to know individual users' passwords.. Use passwords containing both alpha and numeric characters.. Users should log out when leaving his/her workstation.. Users are responsible for reporting any system security violation, or suspected system security violation, to the Information Technology staff immediately.. A user may not permit any other person, including other authorized users, to access University system resources through his/her account.. Each user is responsible for any and all activity initiated in or on University systems by his/her account.. Various contracts prohibit unauthorized users from using Northwood University equipment; thus, no unauthorized party may use Northwood University computer hardware or software.. This includes, but is not limited to, family members and friends of employees.. Supervisor's Responsibilities.. Managers and supervisors should notify Information Technology promptly whenever an employee leaves the University or transfers to another department so that his/her access can be revoked or changed as needed.. Involuntary terminations must be reported concurrent with the termination.. GENERAL TOPICS.. Information Technology is responsible for all equipment purchases, installations, disconnections, modifications, and relocations.. Employees are not to perform these activities.. Any computer hardware or software purchased by Northwood University is the property of the University and is expected to be used on University premises, except for situations where computers are necessary and provided for work assignments away from Northwood offices.. Users who borrow hardware, software, or documentation from Northwood University are responsible for its proper care, and for returning it in a timely fashion.. Many Northwood systems are made available on an unmonitored basis.. It is the responsibility of every user to act in such a manner as to not cause damage to physical equipment.. Accidental damage, or damage caused by other parties, should be reported to the Information Technology staff as soon as possible so that corrective action can be taken.. Modifying configuration of any computer, terminal, printer, or network device without prior approval of Information Technology is prohibited.. Deliberate alteration of system files will be considered malicious destruction of University property.. All Users are responsible for using University facilities in an effective, ethical, and lawful manner.. Many resources, such as disk space, CPU cycles, printer queues, batch queues, login, and software licenses, are shared by all users.. No user may monopolize these resources.. The University has installed firewalls to assure the safety and security of the University's networks.. Only those Internet services and functions with documented business purposes for the University will be enabled at the Internet firewall.. Users are responsible for picking up their printer output in a timely fashion to avoid theft or disposal.. Other organizations operating computing and network facilities that are reachable via Northwood systems may have their own policies governing the use of those resources.. When accessing remote resources from Northwood University facilities, users are responsible for obeying both the policies set forth in this document and the policies of the other organizations.. ADVISORIES.. Every effort is made by Information Technology to prevent the loss of data in the event of hardware or software failure or through human error.. Backups are regularly made of administrative systems and system servers.. (Backups are not made of data stored on personal computers.. ) It must be recognized that in rare cases it may not be possible to restore the latest version of every data file from these backups and some data loss may occur.. Because these cases are outside Information Technology's control, the staff cannot be held liable for any loss of data arising directly or indirectly from failure of hardware, software or from human error.. Information Technology staff has the responsibility to provide advance notice of system shut downs for maintenance, upgrades, or changes so users may plan around periods of system unavailability.. However, in the event of an emergency, Information Technology staff may shut down a system with little or no advance notification.. Every effort will be made to give users a chance to save their work before the system is taken out of service.. SECURING PERSONALLY IDENTIFIABLE INFORMATION.. IT-POL-2.. Northwood University, its employees and vendors have an ethical and sometimes legal responsibility to protect the personally identifiable information of its constituents.. The purpose of this policy is to define Personally Identifiable Information (PII) and standards for its use, storage and disposal.. POLICY.. Personally Identifiable Information (PII):.. Defined as an individual's name, address, or telephone number combined with any of the following:.. Social security number or taxpayer ID number.. Driver's license number.. Account Number.. Credit or debit card number.. Access codes, security codes, passwords or any combination of an individual's information that would permit access to an individual's PII.. Financial information protected under GLBA.. Medical or health information protected under HIPAA.. Student related data protected under FERPA.. PII will not be disclosed except as provided by University policy and procedure or legal disclosure requirements.. PII will be protected and secured in accordance with the following standards.. How to Protect Personally Identifiable Information:.. Electronic Storage and Disposal.. Do not transmit PII via email or the Internet unless the connection is secure or the information encrypted.. Any encrypted communications must be setup and approved by Information Technology.. Do not store PII on a PDA, USB drive, CD, flash memory card, floppy drive or other portable storage media unless the PII has been encrypted using a system setup and approved by Information Technology.. Do not store PII on your laptop or desktop computer's hard drive unless the PII has been encrypted using a system setup and approved by Information Technology.. Exceptions may be granted in cases where employees do not have access to server storage when working in offsite locations.. Do not store PII in public files accessible via the Internet or Intranet.. Examples would be publicly available web pages, unsecured drive shares and course management classes.. Do not download PII from Northwood University databases unless there is a legal or business requirement to do so.. If download files are required, they should be stored on a University server (samba, s drive or group server share).. Destroy media (such as disks, tapes, hard drives) that contain PII in a manner that protects the confidentiality of the information.. Physical Storage and Disposal.. Do not publicly display PII or leave PII unattended.. This includes but is not limited to leaving PII on your desk or on the desk of a co-worker.. Do not take PII home.. Lock offices, desks, and files that contain PII when unattended.. Shred PII when it is no longer needed.. Do not discard PII in the trash without properly shredding the documents beforehand.. Security.. Lock or log off your computer when unattended.. Eliminate the use of PII on forms whenever possible.. Do not share passwords and do not document passwords.. Never provide your password to anyone, including IT employees or someone claiming to be an IT employee.. Authorized IT staff members have full access privileges and do not need to know individual user's passwords.. The Gramm-Leach-Bliley act, FERPA and HIPAA laws should be followed when dealing with confidential or private information.. Legal Disclosure Requirements.. Do not share PII documents or information with anyone unless required by government regulations, specific NU job responsibilities or business requirements.. Be prepared to say "no" when asked to provide that type of information.. Do not communicate confidential student information designated by the FERPA flag.. Notify Northwood University Information Security Manager, Director of Information Technology or Vice President of Finance immediately if you suspect PII may have been compromised.. REFERENCES.. Current Information Security Manager:.. Jim Beechey.. beechey@northwood.. edu.. 989-837-4169.. Current Director of Information Technology:.. Bob Wisler.. bwisler@northwood.. 989-837-4435.. Current Vice President of Finance:.. Don Hunkins.. hunkins@northwood.. 989-837-4211.. Texas Christian University.. "Securing Sensitive Personal Information".. Federal Financial Institutions Examinations Council.. "Interagency Guidelines Establishing Information Security Standards: Small Entity Compliance Guide"..

    Original link path: /dana-na/auth/url_default/welcome.cgi?p=help
    Open archive

  • Title: Northwood University SSL VPN
    Descriptive info: Invalid username or password.. Please re-enter your user information..

    Original link path: /dana-na/auth/url_default/welcome.cgi?p=failed
    Open archive


    Archived pages: 3