(1) These standards and guidelines cover the use of desktop computers or laptops, which are personal workstations that, though possibly linked to other computers via a Local Area Network, function as stand-alone units. Desktop computers or laptops include IBM-compatible personal computers (PCs), Macintoshes, and Unix Workstations. (2) Users and custodians of Desktop computers are subject to the "Conditions of Use" and "Code of Practice" specified in the University's IT Security Policy. (3) Utilize provided password facilities to ensure that only authorized users can access the system. Please refer to the "General Password Policy" for more information. (4) Generally: (5) Users should back up and store important records and programs on a regular schedule. (6) Departmental data must be stored on central data servers i.e. departmental network shared drives. (7) Users should: (8) Users should: (9) Software is protected by the Copyright Act. Unauthorized copying is a violation of University Copyright policies. Anyone who uses software should understand and comply with the license requirements of the software. The University is subject to random license audits by software vendors. If in doubt, please check with the IT Service Desk on software licensing. (10) Auditing of Staff Desktop PCs will be conducted by IT from time to time to ensure that the University is in compliance with copyright laws and acts. (11) Computer Viruses/Worms are self-propagating programs that infect other programs and systems. Viruses and worms may destroy programs and data as well as using the computer's memory and processing power. Viruses, worms, and Trojan horses are of particular concern in networked and shared resource environments because the possible damage they can cause is greatly increased. Some of these cause damage by exploiting holes in system software. Fixes to infected software should be made as soon as a problem is found. (12) To decrease the risk of viruses and limit their spread, users should: (13) Networked computers may require more stringent security than stand-alone computers because they are access points to computer networks. (14) While IT has responsibility for setting up and maintaining appropriate security procedures on the network, each individual is responsible for operating their own computer with ethical regard for others in the shared environment. (15) The following considerations and procedures must be emphasized in a network environment:Desktop Computers Standards and Guidelines
Section 1 - Scope
Section 2 - General Obligations
Hardware Security
Generally, staff must:
Access Security
Data and Software Availability
Confidential Information
Software
Viruses/Worms
Computer Networks
View Current
This is not a current document. It has been repealed and is no longer in force.