Information Technology Guidelines and Policies
1. Web Site Development
Guidelines have been drafted and reviewed by the Faculty Council. The guidelines are currently posted on our Internal Web Site under the College Policies heading.
2. Administrative Rights to Local Machines
Penn State is encouraging all units to operate local computers with the lowest level of administrative privilege consistent with performing necessary functions. When machines with higher levels of administrative privilege are compromised by hackers, the potential for damage to the network is much greater. For this reason the University is encouraging units to operate their machines with the least level of administrative privilege necessary.
Most users have little or no need of higher levels of administrative privilege to do their work, but there may be instances where higher levels of privilege are needed on either a temporary or more permanent basis. The College’s default practice will be to configure all computers connecting to the Penn State network with one local user account for the use of the individual (i.e., without administrative privilege). If an individual user wishes to have administrative privilege, a request should be completed and submitted to the Associate Dean for Research, Outreach, and Technology for review. Please note this policy option is for faculty only.
Please submit your request to the CETC help desk ticket system
3. Establishing Accounts on Computers
Before you were given a Penn State access account you signed an agreement to abide by the university’s “Acceptable Use Policy” which describes prohibited activities like sending spam, trying to sell things, etc. Upon gaining access to the Penn State network, users will be required to log in, and will be reminded of their commitment to comply with University IT policies.
One aspect of acceptable use is not storing any personally identifiable information (like Social Security numbers, credit card numbers, etc). Users will be asked to run software that will help them identify and remove such information, and you will be expected to periodically scan computers for such information.
4. College of Educations Information Technology Resources
We hope you will find this reference guide useful for accessing information or resolving technical challenges that you may experience during your stay in the College of Education. This guide covers information for Windows, Mac and Mobile computers and devices.
5. Disposing of Computer Equipment
The College has developed guidelines and policies for the disposal, End-of-Life (EoL), disposition of computer systems in the College.
6. Internal Security Documentation
The College has developed guidelines and policies covering disaster tolerance.
7. Mobile Documentation
The College has developed guidelines and policies covering the use of mobile devices.
8. Firewall Documentation
The College has developed guidelines and policies covering firewall administration and use.