Campus Technology Services
CTS
CTS  | FAQ's  |  E-MAILMOODLE  |  MYMTECH  |    OREDIGGERWEB    |   WIRELESS  |   LAB COORDINATORS |   CONTACT US

CONTACT US»


Monday - Friday 8:00 AM - 7:00 PM

406.496-4244

ctshelpdesk@mtech.edu

Policies


This policy document is promulgated in order to establish an orderly process for articulating and managing computer and networking systems and facilities at Montana Tech of the University of Montana.  This document determines the standards for appropriate use of computing and networking systems and facilities at Montana Tech.  The users of these systems and facilities, and thus, of these policies, include faculty, students, staff, administration, and any others who make use of these resources.  The policies articulated here apply to all users of these systems and facilities.

The following Security Policies have been modeled on templates provided by the SANS Institute.  The SANS (System Administration, Networking, and Security) Institute is a cooperative research and education organization through which more than 96,000 system administrators, security professionals, and network administrators share the lessons they are learning and find solutions for challenges they face. SANS was founded in 1989.

The core of the Institute is the many security practitioners in government agencies, corporations, and universities around the world who invest hundreds of hours each year in research and teaching to help the entire SANS community.


Following are brief summaries of the contents of each document followed by a link to the complete document.  The following terms are used throughout the documents:

  • ISO - Installation (physical) Security Officer  - Rollo Shea

  • CSO – Computer (and Network) Security Officer – Mike Kukay

  • CSA - Computer (and Network) Security Analyst – Bill Schmidt

  • LSA - Lead System Analyst – depends upon the system

  • CERT - Computer Emergency Response Team

  • CIAC - Computer Incident Advisory Capability

  • Coordinator – College Computer Specialist

 Banner Student/Nolij/Data Warehouse Authorization Request Form


Acceptable Use Statement (Summary)

Users shall not purposely engage in activity with the intent to: harass other users; degrade the performance of systems; deprive an authorized Montana Tech user access to a Montana Tech resource; obtain extra resources, beyond those allocated; circumvent Montana Tech computer security measures or gain access to a Montana Tech system for which proper authorization has not been given.
For complete detailed information please refer to the link below:

Acceptable use Statement full version



Abuse Statement (Summary)

The use of computers or network systems in the College setting in no way exempts any member from the normal requirements of ethical or legal behavior.  Use of a computer and network system that is shared by many users imposes certain additional obligations.  Each member of the community is responsible for his/her actions whether or not rules are built in, and whether or not they can be circumvented.  Refer to the document below for more discussion.

For complete detailed information please refer to the link below:


Abuse Statement full version


Abuse Policy (Summary)

The following document describes the limitations on authorized use of the computers and network systems provided by Montana Tech.

In addition to the limitations described in this document, you are also required to follow the policies, procedures, and statements governing acceptable use of the specific computers and network systems to which you are given access by Montana Tech.  Violations of any of the policies or documents mentioned here should be presumed to violate the Montana Tech of The University of Montana Policy Regarding Abuse of Computers and Network Systems and, hence, the Montana Tech Campus Code of Conduct and the Code of Academic Integrity.

For complete detailed information please refer to the link below:

Abuse Policy full version


Software Piracy:  What You Should Know

Whether you call it borrowing, copying, sharing or "fair use", software piracy is illegal and puts Montana Tech's students, faculty and staff, as well as the college itself, at risk for legal action.  Following are questions and answers relating to software piracy.

For complete detailed information please refer to the link below:

Software Piracy full version


Incident Handling Procedure (Summary)

This document provides some general guidelines and procedures for dealing with computer security incidents.  The document is meant to provide Montana Tech support personnel with some guidelines on what to do if they discover a security incident.

For complete detailed information please refer to the link below:

Incident Handling Procedure full version



 

Escalation Procedures for Security Incidents (Summary)

This procedure describes the steps, which are taken for physical, and computer security incidents that occur within the Montana Tech facility.

For complete detailed information please refer to the link below:

Escalation Procedures full version


Network Connection Policy (Summary)

This policy describes the requirements and constraints for attaching a computer to the Montana Tech local area network (LAN).  All devices connected o the Montana Tech network must meet minimum-security requirements.

The intent of this policy is to ensure that all systems installed on the Montana Tech network are maintained at appropriate levels of security while at the same time not impeding the ability of Montana Tech users and support staff to perform their work.

Secured and unsecured systems are discussed.  For detailed information please refer to the link below:

For complete detailed information please refer to the link below:

Network Connection Policy

 


Special Access Guidelines Agreement (Summary)

This agreement outlines the many do's and do not's of using special access accounts.  Special access is defined as having the privilege and password to use domain administrator accounts.

For complete detailed information please refer to the link below:

Special Access Guidelines full version



Special Access Policy (Summary)

This policy provides a set of requirements for the regulation of special access use on the Montana Tech Computer System.  This policy will provide a mechanism for the addition and removal of people from the special access status and a mechanism for periodic reviews of the special access status.

For complete detailed information please refer to the link below:

Special Access Policy full version



Support Staff Guidelines (Summary)

This document establishes computer usage guidelines for the Montana Tech support staff in the course of their job duties on the Montana Tech Campus Computer Systems.  These guidelines are intended to protect the rights and privacy of Montana Tech clients as well as those of the Montana Tech support staff.

For complete detailed information please refer to the link below:

Support Staff Guidelines full version



Changing Computer and Network Policies

It is recognized the policies contained herein are subject to change as technology, campus mission and organization, and economic priorities advance.  To ensure that these policies are kept up to date and reflect current needs, this statement of policy is necessary.

For complete detailed information please refer to the link below:

Changing Computer and Network Policy full version



Campus Technology Services:

Need more help? Contact the Campus Technology Services Help Desk at 406.496.4244 or by email at  E-mail: ctshelpdesk@mtech.edu.

 Server Image