Updated Approval by President’s Cabinet 8/9/23
Purpose
The purpose of this policy is to establish guidelines for the procurement, installation, and use of software and applications at ³Ô¹ÏÖ±²¥. This policy aims to ensure the integrity, confidentiality, and availability of ³Ô¹ÏÖ±²¥ data, prevent security incidents, and protect ³Ô¹ÏÖ±²¥'s technology assets.
Scope
This policy applies to all ³Ô¹ÏÖ±²¥ employees, contractors, students, and anyone who uses ³Ô¹ÏÖ±²¥'s computing resources. This policy covers all software and applications used at ³Ô¹ÏÖ±²¥, whether they are installed on university-owned or personal devices.
Policy
-
- Software and application procurement:
- ³Ô¹ÏÖ±²¥ will acquire software and applications from reputable vendors, and only after a thorough evaluation of their features, compatibility, licensing, and security requirements.
- All software and application purchases must be approved by ³Ô¹ÏÖ±²¥'s IT department or designated authority.
- ³Ô¹ÏÖ±²¥ will ensure compliance with all software licensing agreements and copyright laws.
- Software and application installation:
- Only authorized personnel may install software and applications on college-owned devices.
- All software and applications must be installed from a trusted source, and users must verify the authenticity and integrity of the software before installation.
- Users must not modify, tamper with, or delete any software or application files, libraries, or configurations without prior approval from the IT department.
- Software and application use:
- Users must use software and applications only for their intended purposes and in compliance with ³Ô¹ÏÖ±²¥'s policies, procedures, and applicable laws.
- Users must not share software or applications with unauthorized individuals or install them on personal devices without prior approval from the IT department.
- Users must report any software or application-related security incidents or vulnerabilities to the IT department promptly.
- Software and application updates and patches:
- The IT department will manage the installation of software and application updates and patches to ensure the security and stability of ³Ô¹ÏÖ±²¥'s computing resources.
- Users must not delay or refuse to install critical software or application updates or patches.
- Non-compliance:
- Violation of this policy may result in disciplinary action, including but not limited to revocation of access to university computing resources, termination of employment or enrollment, and legal action.
- Users must report any suspected or actual non-compliance with this policy to the IT department or designated authority.
- Exceptions:
- Any exceptions to this policy must be approved by the VP for Information Technology Services or designated authority.
- Software and application procurement:
Enforcement
The IT Department or designated authority will enforce this policy and monitor compliance. ³Ô¹ÏÖ±²¥ reserves the right to modify this policy as needed to ensure the effective use of computing resources and the protection of EGSC data and assets.