Ä¢¹½ÊÓƵÍø

Information Technology Policies

IT 000 - Information Technology Resource Use

Number

IT 000

Purpose

To maximize the value and use of CWI’s Information Technology (IT) Resources consistent with applicable state and federal law and the policies of the Idaho Technology Authority (ITA), the Idaho State Board of Education (SBOE) and CWI.

Department

Information Technology

Effective

December 1, 2016

Last Revision

December 19, 2016

Scope

Applies to all users of CWI’s IT Resources.

Definition

Information Technology (IT) Resources: An array of products and services that collect, transform, transmit, display, present, and otherwise make data into usable, meaningful and accessible information. IT Resources include but are not limited to: desktop computers, laptops, and tablet PC’s; handheld devices including but not limited to, cell phones; e-mail, voicemail, servers, central computers, and networks; cloud storage systems; network access systems including wireless systems; portable hard drives and databases; computer software; printers and FAX machines and lines; campus, classroom and office audio and visual display devices and switching, camcorders, televisions, physical media; telephone equipment and switches including local and long-distance services; satellite equipment and any other current or future IT resource adopted by CWI as new technologies are developed.

User: Anyone who uses CWI’s information technology resources, even if they have no responsibility for managing the resources. This includes students, faculty, staff, contractors, consultants, and temporary employees.

Policy 

CWI’s IT Resources are provided to support CWI and its academic and service missions, CWI’s business and administrative functions, and its student and campus life activities. Use of CWI’s IT Resources must comply with state and federal laws and regulations and policies of the Idaho Technology Authority (ITA), the Idaho State Board of Education and CWI.

Guidelines 

Personal Use Limited 

The primary purpose of CWI’s IT Resources is to conduct official CWI business. CWI employees may, however, use the Internet and electronic mail on occasion for individual purposes on their personal time as provided by applicable CWI policies and procedures.

Academic Freedom And Associated Responsibilities

The First Amendment rights of academic freedom and freedom of expression, including the responsibilities associated with those rights, apply to the use of CWI’s IT Resources.

Rights and responsibilities related to the use of CWI’s IT Resources are guided by this policy, CWI’s Respectful Community Policy, the Student Code of Conduct, other applicable CWI policies, the policies of the Idaho State Board of Education and Idaho Technology Authority (ITA) and other state and federal laws and regulations.

Limited Privacy Expectations

CWI, as a public institution of higher education, is subject to the public records laws of the state of Idaho. While some information may be exempt from disclosure, information or records stored on CWI’s IT Resources are generally presumed to be open for review and inspection and are subject to public disclosure requests and examination by CWI officials in order to determine if exemptions apply to prohibit disclosure. As such, CWI will examine and disclose information or records stored on CWI’s IT Resources as required by law. In addition, CWI may have a business necessity or reason to access and examine information, records, files, communications, and accounts of its employees or students, including but not limited to the investigation of substantiated complaints or other reliable evidence of misuse or violation of law or policy. Therefore, Users of CWI’s IT Resources should have a limited expectation of privacy in the use of such resources.

Prohibited Actions

College IT Resources shall not be used for:

  • Commercial or personal profit-making purposes or for personal benefit where such use incurs a cost to CWI and is not academic or work related. Accessing or attempting to access another person’s directory, files, or mail, whether protected or not, without permission of the owner. Attempts to access unauthorized IT Resources via the computer network, to decrypt materials, or to obtain privileges to which the user is not entitled are prohibited.
  • Visiting, viewing or distributing Internet sites or materials that contain obscenity, as defined under applicable federal and state law; and publishing, displaying, transmitting, retrieving or storing such obscene material.
  • Intentional access to or dissemination of pornography by CWI employees, temporary staff, contractors or vendors, unless such use is specific to work-related functions and has been approved by the respective manager or such use is specifically related to an academic discipline or grant/research project. This applies to any electronic communication distributed or sent within the CWI network or to other networks while using the CWI network.
  • Intentionally or negligently interfering with the proper operation of any system or its use by others.
  • Creating or distributing defamatory material or true threats, as defined under applicable law or other illegal activity, including but not limited to stalking as defined under applicable law or CWI policy.
  • Downloading, disseminating, storing, using, or printing materials in violation of copyright laws including articles, music, videos, games, and software. See CWI’s Intellectual Property and Copyright policy for more details.
  • Causing congestion, overload or disruption of networks or systems, including the distribution of chain letters.
  • Creating or knowingly disseminating unwanted and unsolicited emails or materials (spam) in such a large volume that it tends to disrupt the proper functioning of College IT Resources or individuals’ ability to use such resources.

Users of College IT Resources shall not:

  • Remove, transfer, disable or dispose of computer software licensed to CWI. Contact IT for details.
  • Share CWI user credentials and passwords with other persons. Each user must have an individual account, passwords must be protected, and the user must not leave a machine logged on when not present unless the machine has been electronically locked and is in a secure area, such as a private office.
  • Consume unreasonable amounts of resources. CWI may impose restrictions or limits on the use of such resources.
  • Falsify e-mail or newsgroup postings.
  • Attempt to circumvent login or security procedures.

Policy Non-Compliance 

Suspected violations of this policy should be reported to the appropriate supervisor, department head, Dean, Vice President or IT.

Use of CWI’s IT Resources is a privilege, not a right, and abuse may result in the immediate removal of privileges pending final resolution.

Violation of any portion of this policy may result in corrective action. Whether a violation has occurred and the appropriate corrective action will be determined by the violator’s supervisor, department head, Dean, or Vice President. Incidents will be evaluated on a case by case basis and may result in one or more of the following:

  • Restricted access or loss of access to the CWI network or CWI’s IT Resources;
  • Suspension or expulsion, in the case of students;
  • Dismissal from employment, in the case of faculty and staff;
  • Exclusion from campus, in the case of vendors or members of the public; and/or
  • Civil and/or criminal liability.

IT 010 - Server Administration

Number

IT 010

Purpose

To provide guidelines for the administration of CWI’s server environment.

Department

Information Technology

Effective

December 1, 2016

Last Revision

December 19, 2016

Scope

Applies to CWI’s servers that house all software and applications utilized users.

Definition

Host: A server that is configured explicitly to run software that provides virtual servers for CWI’s server environment. Many hosts make up a cluster.

Server: A computer that is configured to provide services to other computers on the CWI network. These services include file sharing, printing, database access, email, authentication and applications utilized by staff, faculty and students. Servers can be physical machines or can be a virtual server on a special server called a host.

User: Anyone who uses CWI’s information technology resources, even if they have no responsibility for managing the resources. This includes students, faculty, staff, contractors, consultants, and temporary employees.

Policy

Information Technology (IT) will provide a robust server infrastructure for CWI for the purpose of providing services such as mission critical applications, printing, file shares, backups and software patching.

To support a reliable server infrastructure, all CWI Users shall conform to the guidelines detailed in this policy.

Guidelines

Responsibility

IT is responsible for every aspect of the server infrastructure which includes:  

  • Installation and maintenance of all server hardware, including all hosts, hard drives and cabling.
  • Patching and upgrades of all server software.
  • All software installed on the servers, including all applications, virus protection, licenses and any running services.
  • Security of all servers including maintaining passwords, usernames, IP addressing.

Best Practices 

  • IT shall seek and adopt, whenever possible, best practices with regards to the acquisition, implementation, management and replacement of server infrastructure resources.
  • IT will review and adopt appropriate standards and procedures that represent best practices.

Access

Access to the server infrastructure is limited to the Server Administration group at CWI. Administrative access will not be granted to any other party.

Virus Protection

Server antivirus software is required for all servers connected to CWI’s infrastructure. Such software must be installed and running, and virus definitions kept up-to-date.

Documentation

IT will maintain documentation of the server infrastructure data including:

  • IP addressing
  • DNS information
  • Licensing
  • Patch levels
  • Services provided
  • Contact information
  • Backup schedule

Data Recovery

All servers in the CWI server infrastructure will be regularly backed up. All backups will be regularly tested and verified.

IT 020 - Telephone Services

Number

IT 020

Purpose

To establish guidelines for CWI’s telephone and telecommunication services.

Department

Information Technology

Effective

December 1, 2016

Last Revision

December 19, 2016

Scope

Applies to all users of CWI’s Telephone Services.

Definition

Telephone Services: CWI’s telephone lines, equipment, products, maintenance, and other related resources that assist employees and students in their telecommunications needs.

User: Anyone who uses CWI’s information technology resources, even if they have no responsibility for managing the resources. This includes students, faculty, staff, contractors, consultants, and temporary employees.

Policy

CWI provides Telephone Services based on cost-effective practices that also comply with government rules and regulations. This policy guides decisions that ensure quality service to CWI’s community in a cost effective manner.

Guidelines

Responsibilities

CWI’s Information Technology Department is responsible to:

  • Manage Telephone Services and other telecommunications resources.
  • Negotiate Telephone Services contracts on behalf of CWI.
  • Centrally manage and administer all equipment and services under the direction of the Chief Information Officer.

Generally, departments and users should use CWI Telephone Services for work-related purposes.

  • Personal use of Telephone Services that do not incur additional charges may be permitted in moderation, with supervisor approval and subject to departmental guidelines and restrictions. 
  • Department guidelines should reflect that the employee’s first responsibility is to his/her work assignment and personal use of CWI’s Telephone Services may not result in additional costs to CWI or adversely affect employee performance.

Policy Non-Compliance

Misuse of CWI’s Telephone Services may be grounds for corrective action up to and including termination and/or suspension or expulsion in the case of a student. All users should be aware that the misuse of Telephone Services could also result in civil action and/or criminal prosecution.

IT 030 - Software Usage

Number

IT 030

Purpose

To ensure compliance with applicable statutes, regulations and mandates relating to the use of software made available by CWI and to establish acceptable practices and responsibilities associated with the use of such software.

Department

Information Technology

Effective

December 1, 2016

Last Revision

December 19, 2016

Scope

Applies to all users at CWI and to all software provided by CWI.

Definition

Electronic Technology Resources (“ETRs”): Desktop computers, laptop computers, tablets, cell phones, and handheld devices in which CWI has an ownership, lease, license, proprietary, managerial, administrative, maintenance, or other legal or equitable interest.

License: A type of proprietary or gratuitous license as well as a memorandum of contract between a producer and a user of the computer software that specifies the parameters of the permission granted by the producer to the user.

Software: Any and all computer software (licensed, freeware, shareware).

User: Anyone who uses CWI’s information technology resources, even if they have no responsibility for managing the resources. This includes students, faculty, staff, contractors, consultants, and temporary employees.

Policy

CWI provides users with access to a wide variety of Software. This Software is a valuable resource provided for the limited purposes of advancing, enhancing and promoting the business and educational opportunities made available by CWI. This policy sets forth guidelines regarding the use of such Software and establishes acceptable practices and responsibilities associated with the use of such Software. CWI prohibits the improper or illegal use of Software by Users

Guidelines

Ownership

Software, sent, received, or stored on CWI’s ETRs is the sole and exclusive property of the granted license owner.

Copyright

All Software is protected under United States copyright law from the time of its creation. CWI has licensed copies of Software from a variety of producers to help fulfill its mission. Unless otherwise provided in the Software license, duplication of copyrighted Software, except for backup and archival purposes, is a violation of applicable laws and this policy.

CWI may track Software usage at any time for any reason. All CWI-owned applications, including Blackboard, are filtered, monitored and logged for, among other things, content, sites visited, patterns of activity, routing information, and duration of use. Accordingly, no User has (or should expect to have) any right of privacy or confidentiality with respect to the use of CWI’s Software. Whether for the purpose of managing those resources and traffic flow, assuring system security, verifying and ensuring compliance with CWI policies or applicable law, or for any other reason, CWI expressly reserves the right (from time-to-time or at any time) to intercept, divert, discard, access or review any Internet connection, other electronic communications or Software stored on CWI’s ETRs.

CWI also reserves the right to disclose to other persons or otherwise use the contents of any Software for any of the foregoing purposes, as well as for the purposes of complying with or assisting law enforcement officials or legal authorities who may, by subpoena, search warrant or otherwise, seek review of communications, or for the purpose of litigation or other legal proceedings.

Idaho Public Records Act 

As a political subdivision of the state of Idaho, CWI is subject to the Idaho Public Records Act. Except as specifically provided therein, the Idaho Public Records Act expressly denies to CWI employees any expectation of privacy in their use of CWI’s ETRs. Users should be aware that their use of ETRs may be subject to the public’s right to inspect and copy records, as that term is defined by Idaho law, of Software installed on CWI’s ETRs.

Standards Of Conduct

Users shall, as an express condition of their use, comply with the following standards of conduct with respect to the use of CWI Software:

  • CWI software shall be used only for authorized purposes, which are limited to educational-related coursework, academic research, and work-related departmental activities.
  • Users may not knowingly use Software for which the organization lacks the appropriate license. If you become aware of the use or distribution of unauthorized Software at CWI, you must notify your supervisor.
  • Users shall only use CWI-approved copyrighted Software installed by designated CWI personnel and in compliance with vendor license requirements. Peripheral devices must be approved and installed by designated CWI personnel.
  • Users shall not use programs to decode passwords or otherwise gain unauthorized access to control of information.
  • Users shall not use Software for commercial, religious, or political purposes, including but not limited to, using electronic mail to circulate advertising for products or for political candidates or issues.
  • Users shall not make or use illegal copies of copyrighted Software, store such copies on ETRs, or transmit them over ETRs.
  • Users may not loan or give to anyone any Software licensed to CWI. 
  • Users may not install CWI Software on a personal system unless the software license agreement so allows (i.e. Office365).
  • No user may use or distribute personally owned Software on CWI’s ETRs. Such Software threatens the integrity and security of CWI’s computers and networks.
  • A variety of Software is available on the Internet. Some of the Software, called “freeware” or “shareware,” is available free of charge for limited use and may be used within the organization with approval and testing by IT to ensure the suitability of the Software for use within CWI. No member of CWI should download such Software to his/her ETR prior to approval and testing for suitability.

Enforcement And Reporting 

CWI’s Chief Information Officer is responsible for enforcement of this policy. All Users of Software are required to report any violations of this policy to the Chief Information Officer.

Limitation Of Liability

CWI makes no warranties of any kind, either express or implied, that the functions of the Software will be error free or without defect. CWI is not responsible for any damage Users may suffer, including but not limited to, loss of data or interruptions of service. CWI is also not responsible for the accuracy or the quality of the information obtained through or stored on the system. CWI is not responsible for any financial obligations arising from the unauthorized use of Software.

Violation Of Policy

Any violation of this policy may result in corrective action up to and including termination of employment and/or suspension or expulsion in the case of a student. Additionally, Users are subject to loss of Software privileges and, in appropriate cases, civil and/or criminal prosecution.

IT 040 - Remote Access

Number

IT 040

Purpose

To state the requirements for remote access to computing resources hosted at CWI using Virtual Private Network (VPN) technology.

Department

Information Technology

Effective

December 1, 2016

Last Revision

December 19, 2016

Scope

Applies to all CWI Users.

Definition

Information Technology (IT) Resources: An array of products and services that collect, transform, transmit, display, present, and otherwise make data into usable, meaningful and accessible information. IT Resources include but are not limited to: desktop computers, laptops, and tablet PC’s; handheld devices including but not limited to, cell phones; e-mail, voicemail, servers, central computers, and networks; cloud storage systems; network access systems including wireless systems; portable hard drives and databases; computer software; printers and FAX machines and lines; campus, classroom and office audio and visual display devices and switching, camcorders, televisions, physical media; telephone equipment and switches including local and long-distance services; satellite equipment and any other current or future IT resource adopted by CWI as new technologies are developed.

Remote Access: Access to IT Resources from an electronic or other device not directly connected to the CWI wired or wireless networks, but not including accesses to such IT Resources where Remote Access is considered a primary function and normative use. For example, use of a Web browser to remotely access a CWI Web page is not covered by this policy.

Remote User: One who uses an electronic or other device for Remote Access.

User: Anyone who uses CWI’s information technology resources, even if they have no responsibility for managing the resources. This includes students, faculty, staff, contractors, consultants, and temporary employees.

Virtual Private Network (VPN): a secured private network connection built on top of a public network. A VPN provides a secure encrypted connection or tunnel over the Internet between a CWI individual computer and a private network. VPN allows members of CWI to securely access CWI network resources as if they were on campus.

Policy

Remote Access to CWI’s IT Resources must be accomplished in a manner that furthers CWI’s mission while preventing unauthorized use of those resources. This policy is designed to ensure that CWI’s IT Resources are used for the purposes for which they are intended. Accordingly, CWI prohibits illegal or unauthorized Remote Access to CWI’s IT Resources. Only authorized CWI employees may utilize CWI’s VPN for Remote Access.

Guidelines 

In order to connect to the VPN it is necessary for Remote Users to install the approved Cisco Anyconnect Software on a laptop provided by CWI (software URL will be provided). Remote Users will need a connection to the Internet from their off-campus location. CWI does not provide Remote Users with an Internet connection, their Internet Service Provider does.

  • It is the responsibility of all employees with Remote Access privileges to ensure that unauthorized users are not allowed access to internal CWI networks and associated content.
  • Remote Access is subject to all applicable CWI policies.
  • All employees, while using CWI’s VPN technology for Remote Access, are a de facto extension of the CWI network, and as such are subject to the CWI Internet Usage Policy.
  • All computers or electronic devices connected to CWI’s internal network via the VPN or any other technology must use a properly configured up-to-date operating system and anti-virus software.
  • Redistribution of the CWI VPN Cisco client or associated installation information is prohibited. 
  • All employees using CWI’s VPN shall only connect to or have access to machines and resources that they have permission and rights to use. 
  • Support will only be provided for VPN clients approved by CWI’s Information Technology Services.
  • All Remote Users must use the centrally provided VPN client software.
  • All systems used for Remote Access must have an enabled firewall.
  • All employees must recognize that the use of the VPN system does not guarantee that all transmissions between the remote PC and the CWI network are secure. It is the Remote User’s responsibility to configure their applications to use the VPN if they desire their transmissions to be secure.

Enforcement

CWI’s Chief Information Officer is responsible for enforcement of this policy.

Violation Of Policy

Any violation of this policy may result in corrective action up to and including termination of employment and/or suspension or expulsion in the event of a student. Additionally, Users who violate this policy may be subject to loss of software privileges, civil action and criminal prosecution.

IT 050 - Centralized IT Services

Number

IT 050

Purpose

The purpose of this policy is to provide for a uniform and systematic method for providing IT services required by CWI.

Department

Instruction

Effective

December 1, 2016

Last Revision

December 19, 2016

Scope

Applies to all Users who access CWI’s IT Resources.

Definition

Information Technology (IT) Resources: An array of products and services that collect, transform, transmit, display, present, and otherwise make data into usable, meaningful and accessible information. IT Resources include but are not limited to: desktop computers, laptops, and tablet PC’s; handheld devices including but not limited to, cell phones; e-mail, voicemail, servers, central computers, and networks; cloud storage systems; network access systems including wireless systems; portable hard drives and databases; computer software; printers and FAX machines and lines; campus, classroom and office audio and visual display devices and switching, camcorders, televisions, physical media; telephone equipment and switches including local and long-distance services; satellite equipment and any other current or future IT resource adopted by CWI as new technologies are developed.

User: Anyone who uses CWI’s information technology resources, even if they have no responsibility for managing the resources. This includes students, faculty, staff, contractors, consultants, and temporary employees.

Policy

CWI provides Information Technology Resources through a Centralized IT model. All departments and users are required to utilize CWI’s centralized IT department for all IT needs. Benefits of this model include:

  • Lower hardware expenses for IT infrastructure
  • Improve productivity for IT staff
  • Increase purchasing power
  • Help meet industry regulations
  • Improve the flow of information

Guidelines 

Centralized IT Services 

CWI’s centralized IT organization provides all IT services to CWI. These services include, but are not limited to:

  • Centralized purchasing of all IT Resources
  • Helpdesk and desktop support services
  • Classroom, conference room and informal learning space support service
  • Computers – desktop, laptop, and other
  • Electronic Mail
  • Telephones and telephony service
  • Fax machines and lines
  • Internet
  • Copiers and printers, and their service and supplies
  • Software – general (i.e. MS Office) and program specific (i.e. CADD)
  • Servers
  • Data storage
  • Network infrastructure
  • Classroom Audio-Visual installation and support
  • Campus Audio and visual display systems

Policy Non-Compliance

Any violation of this policy may result in corrective action up to and including termination of employment and/or suspension or expulsion in the case of a student.

IT 060 - Computing Device Support

Number

IT 060

Purpose

To provide a reliable computing device platform which will enhance the workflow and productivity of the CWI community.

Department

Information Technology

Effective

December 1, 2016

Last Revision

December 19, 2016

Scope

Computing device standards apply to all departments, units and offices of CWI. These computing device standards apply only to the “business” functions of CWI, not the “scholarship” functions (i.e., e-mail, calendaring, strategic planning and budgeting fall within the scope of this policy, but not the hardware and software in teaching and research labs).

Definition

User: Anyone who uses CWI’s information technology resources, even if they have no responsibility for managing the resources. This includes students, faculty, staff, contractors, consultants, and temporary employees.

Policy

CWI strives to provide a reliable computing device platform in which end users have confidence and which will enhance the workflow and productivity of the college community. Accordingly, CWI has adopted the following standards for the purpose of providing high quality service and support. These standards will lead to high quality service and support. If a department or unit needs other desktop products to provide for the scholarship or special needs of that department, then it is important to devote the resources needed to guarantee assistance for users of those products. These standards are set forth to provide consistency, support and the exchange of information as well as access to, and use of, the College’s business systems. In addition, these standards allow for compatibility and thorough, consistent support from the IT Department, co-workers, and vendors. They ensure that information can be distributed in a format and manner that the College community can read, use, and understand, thus promoting a productive working and education environment. A process for exceptions provides for specialized needs.

Guidelines

Responsibility

Responsibility for these standards belongs to CWI’s Chief Information Officer (CIO). Standards will be periodically evaluated and reviewed. Hardware and software, including groupware applications such as virtual whiteboard, distance learning, hosted storage, and collaborative computing will be examined on a regular basis. The Enterprise Technology Advisory Committee and Academic Technology Advisory Committee (standing committees with representation from all areas of CWI) will make recommendations on additions, deletions and/or modifications to these standards. This committee will review the current standards on a regularly scheduled basis. Others wishing to make recommendations may make them directly to the CIO.

Updates of Supported Products

A list of supported products will be updated regularly and be made available to the CWI community on the web.

  • It is the responsibility of individual departments and Users to access the web and stay current on what products and versions of products are supported and recommended.
  • These standards apply to all acquisitions independent of acquisition method or funding source, e.g., grants, donations, rental or leases, etc.

Standards

Full Support

For purposes of this policy, “full support” means that support from the product vendor is still available. Further, assuming that the product is fully compatible with campus administrative systems, IT staff members are fully product knowledgeable and documentation is available. For fully supported products, Users may expect problem resolution, user seminars may be offered, and product consultation may be arranged.

Partial Support

For purposes of this policy, “partial support” means the product may or may not be supported by the vendor, the product may not be fully compatible with campus administrative systems or specific known compatibility issues exist, and product documentation and user training is not available. Under these circumstances IT staff will provide a best effort to support the product.

Office Productivity Suite

Microsoft Office is supported for its compatibility with the campus administrative systems. The campus administrative systems dictate which versions of Office are covered by full support. All versions of Office will be supported throughout .

Web First

Users should remember that the Web is an extremely valuable way to distribute information, especially in a commuter institution like CWI. It is often preferable to the distribution of paper. Users should consider options for paperless distribution over printed distribution.

Mail and Calendaring

Microsoft Outlook is the fully supported college standard, which provides a collaborative environment for our campus community.

Web Browsers

The following web browsers are supported:

  • Microsoft Internet Explorer
  • Chrome 
  • Mozilla Firefox
  • Safari

The browsers and the different versions are supported throughout the browser’s (and specific version’s) life cycle. The campus administrative systems dictate which browsers are installed on CWI computers and covered by full support.

Desktop And Laptop Computers 

If required to perform his/her job duties, a User will be provided with a single computing device, a desktop or laptop. Exceptions require presidential approval.

The Operating System installed on the computer will be fully supported within the manufacturer’s support product life cycle or end of life statements. The campus administrative systems dictate the rate at which new Operating System versions can be introduced to campus Microsoft Windows. Life cycle information can be found at .

Windows-based computers will be fully supported for four (4) years after the purchase date. After four (4) years the computer will be partially supported. If a computer requires more than $300 dollars of repairs and/or upgrades, a replacement should be considered instead of the repair.

Information Technology will only support licensed versions of software, as set forth in CWI’s Software policy.

Laptop computers have become a good, practical, business purchase. Rugged laptops may be appropriate for Users who move around the institution, travel, or attend frequent meetings. The appropriate choice is encouraged. On the other hand, desktop machines should be purchased for Users who work mainly in their offices.

Mobile Devices

Mobile devices can be an appropriate choice for the on-the-go User and may be provided on a case-by-case basis with presidential approval. The appropriate device allows the User to stay in contact with the office, organize daily tasks, and carry important information electronically such as contacts or documents.

Mobile “information consumption” devices, such as the iPad, may be practical business purchases in limited instances. Administration staff and those employees who travel extensively and participate in many meetings may be assigned an iPad or other device in addition to their primary computing device. Obtaining such a device requires presidential approval.

Electrical Power

Surge protectors, not to be confused with power strips, are to be acquired and used with all computing equipment (PCs, printers, FAX machines, etc.).

Backups

Backups are an important part of computing. Lost or corrupted data means the re-entering of data and/or the possibility of data that can never be recovered. Thus, all business, academic and other College-owned work and documents are to be stored on the Users’ personal network drive (H:\) or a network drive (i.e. I:\). This ensures that information is appropriately backed up, should a hard drive fail.

Critical data must be stored on a file server where backups are performed automatically. Employees should check with the network administrator to determine what backups are performed. More information on server backups can be found in CWI’s Server Administration policy.

Storing data on local drives is not recommended and the safety of such data is the responsibility of the assigned User of the computer. All files created or revised each day should be backed up if they are stored on a local drive.

Cloud-Based Back Up And Storage

  • Use of cloud computing services for work purposes must be formally authorized by CWI’s CIO. The CIO will certify that security, privacy and all other IT management requirements will be adequately addressed by the cloud computing vendor.
  • For any cloud services that require Users to agree to terms of service, such agreements must be reviewed and approved by the CIO.
  • The use of such services must comply with all other CWI policies, including but not limited to Information Technology Resource Use, Internet Usage, and Personal Computer Equipment and Software Support policies.
  • Employees must not share log-in credentials with co-workers. The IT Department will keep a confidential document containing account information for business continuity purposes.
  • The use of such services must comply with all laws and regulations governing the handling of personally identifiable information, corporate financial data or any other data owned or collected by CWI.
  • The CIO decides what data may or may not be stored in the Cloud.
  • Personal cloud services accounts may not be used for the storage, manipulation or exchange of College related communications or College-owned data.

The following table outlines the data classification and proper handling of CWI data.

Data Classification Cloud Storage Network Drive Local Storage
CWI Protected Not Allowed Allowed No special requirements, subject to any applicable laws Not allowed
CWI Sensitive Allowed, but not advised Requires CIO approval Allowed No special requirements, subject to any applicable laws Allowed, but not advised Requires dept. manager approval
CWI Public Allowed No special requirements Allowed No special requirements Allowed No special requirements

 

Exceptions 

Any department or office that requires an exception to these standards should submit such a request in writing to the CIO. The request should state the following:

  • The requested exception
  • Justification
  • A signed statement of support from the appropriate Dean or Director.
  • Processing and review will require one week.

The User must commit funding and other appropriate resources to providing hardware and software support for the exception. Only CWI’s CIO and Vice President of Finance and Administration (VPFA) can authorize an exception to these standards.

IT 070 - Internet Usage

Number

IT 070

Purpose

To set forth guidelines for Internet access and usage at CWI.

Department

Information Technology

Effective

December 1, 2016

Last Revision

December 19, 2016

Scope

Applies to all Users who access CWI’s Internet resources.

Definition

Information Technology (IT) Resources: An array of products and services that collect, transform, transmit, display, present, and otherwise make data into usable, meaningful and accessible information. IT Resources include but are not limited to: desktop computers, laptops, and tablet PC’s; handheld devices including but not limited to, cell phones; e-mail, voicemail, servers, central computers, and networks; cloud storage systems; network access systems including wireless systems; portable hard drives and databases; computer software; printers and FAX machines and lines; campus, classroom and office audio and visual display devices and switching, camcorders, televisions, physical media; telephone equipment and switches including local and long-distance services; satellite equipment and any other current or future IT resource adopted by CWI as new technologies are developed.

User: Anyone who uses CWI’s information technology resources, even if they have no responsibility for managing the resources. This includes students, faculty, staff, contractors, consultants, and temporary employees.

Policy

CWI provides Internet access in order to enhance the student’s learning, efficiency and productivity with guidance from employees. It also is provided to faculty and staff for the purpose of performing their jobs. This technology allows Users to access resources beyond the boundaries of CWI’s physical campus. While the internet offers a wealth of material that is personally, culturally, and professionally enriching to Users of all ages, it also enables access to some material that may be inaccurate, offensive or disturbing to others, or illegal under state or federal law. CWI cannot police the global network and takes no responsibility for its content. The operation of the Internet relies heavily on the proper conduct of the Users who must adhere to the guidelines in this policy, as well as applicable law.

These guidelines apply to the use of CWI IT Resources to access information on the Internet and to the use of CWI IT Resources to provide information to other Internet users. Internet access is a privilege, not a right. CWI prohibits the improper or illegal use of Internet privileges by Users. Violations of the law may result in legal action. Any User violating this policy is likewise subject to loss of access privileges and other appropriate disciplinary actions.

Guidelines 

Acceptable Internet Use

  • Activities that support CWI-related events or business.
  • Research activities.
  • Activities that support or foster educational purposes or pursuits
  • Creation of Web Pages/Sites; Users who publish web pages are responsible for the content of those pages and are required to comply with all CWI policies and procedures as well as state and federal laws.
  • CWI e-mail account access

Unacceptable Internet Use

  • Violating or attempting to violate computer system or network integrity, including attempts to bypass network security functions or to obtain restricted passwords for system administration.
  • Using CWI IT Resources to harass others.
  • Utilizing the Internet and/or CWI equipment for unauthorized material or for commercial gain or profit.
  • Using the Internet or CWI IT Resources for any activity prohibited by local, state, federal or international law.
  • Abuse of bandwidth.
  • Personal use of social media sites.
  • Online gaming.

Limitation Of Liability

CWI makes no warranties of any kind, whether express or implied, for the Internet service it is providing. CWI is not responsible for any monetary or non-monetary damages a User may suffer, including loss of data, nor is it responsible for the accuracy or quality of information obtained through its Internet resources.

Policy Non-Compliance

Any User found in violation of this policy may have the privilege of using all CWI IT Resources revoked. CWI’s Chief Information Officer will make the final determination as to what constitutes unacceptable Internet use; his/her decision is final.

CWI students may report violations of this policy to an appropriate department head, Dean or Vice President, the Chief Information Officer or, if appropriate, the Title IX Coordinator. Possible sanctions include deletion of material or direct links to other locations on the Internet, loss of IT Resource privileges, and further corrective action as provided by CWI policy.

Employees may report violations of this policy to their immediate supervisor, an appropriate department head, Dean or Vice President, the Chief Information Officer or, if appropriate, the Title IX Coordinator. Possible sanctions include deletion of material or direct links to other locations on the Internet, loss of IT Resource privileges and further corrective action.

IT 080 - Information Privacy And Data Security

Number

IT 080

Purpose

To classify data and establish minimum standards and guidelines to protect against accidental or intentional damage or loss of data, interruption of CWI business, or the compromise of confidential information.

Department

Information Technology

Effective

December 1, 2016

Last Revision

December 19, 2016

Scope

Applies to all users with access to (a) confidential information through CWI or its affiliates or (b) college information resources, including those used by CWI under license, contract, or other affiliation agreement.

Definition

Access: Any personal inspection or review of the confidential information or a copy of the confidential information, or an oral or written account of such information.

Confidential Information: Information identified by applicable laws, regulations, or policies as personal information, individually identifiable health information, education records, personally identifiable information, non-public personal data, confidential personal information, or sensitive scientific or sponsored project information. Confidential information includes but is not limited to any information that identifies or describes an individual such as a social security number, physical description, home address, non-business telephone numbers, ethnicity, gender, signature, passport number, bank account or credit card numbers, expiration dates, security codes, passwords, educational information, medical or employment history, driver’s license number, or date of birth. It also includes electronic data that includes an individual’s first name or first initial and last name in combination with one or more of the following data elements, when either the name or data elements are not encrypted: 1) social security number; 2) driver’s license or state identification card number; 3) student or employee identification number; or 4) credit card number in combination with any required security code, access code, password, or expiration number that would permit access to an individual’s financial account.

Confidential information does not include any information knowingly and voluntarily made publicly available by the owner of such information, such as information voluntarily listed in college or other public directories. Custodian: Member of the CWI community having primary responsibility for gathering, inputting, storing, managing, or disposing of confidential information. One becomes a custodian either by designation or by virtue of having acquired, developed, or created information resources for which no other party has stewardship. For example, for purposes of this policy, librarians have custody of library catalogs and related records, faculty have custody of their research and course materials, students have custody of their own work, and any individual who accepts a credit card number in the course of conducting CWI business is the custodian of that information. The term does not necessarily imply legal ownership.

Data: Information generated in the course of official CWI business. Information that is personal to the operator of a system and stored on a college IT resource as a result of incidental personal use is not considered CWI data.

Disclosure: To permit access to or release, transfer, disseminate, or otherwise communicate any part of information by any means, including but not limited to orally, in writing, or by electronic means to any person or entity.

Incident: A potentially reportable incident that may include, but is not limited to, the following:

  • Attempts to gain unauthorized access to systems or data;
  • Unwanted disruptions or denial of services;
  • A virus outbreak;
  • Theft, misuse or loss of electronic equipment containing confidential information;
  • Unauthorized use of systems for processing or data storage;
  • Circumstances where a department or unit cannot account for or fails to properly dispose of paper records containing confidential information; or
  • Unauthorized changes to system hardware, firmware and software.

Individually Identifiable Health Information: Any information, including demographics, collected from an individual that is created or received by a health care provider, health plan, employer, or health care clearinghouse relating to the past, present or future physical or mental health or condition of an individual and identifies the individual, or information which can reasonably be expected to identify the individual.

Information Resources: Includes information in any form and recorded on any media, and all computer and communications equipment and software.

Information Security Officer (ISO) – The individual or individuals responsible for protecting confidential information in the custody of CWI; the security of the equipment and/or repository where this information is processed and/or maintained and the related privacy rights of college students, faculty and staff concerning this information. An ISO has primary responsibility for oversight of information security, networks and systems, and working in cooperation with IT and Human Resource (HR) to educate the CWI community about security responsibilities.

Information Service Provider (Service Providers): A person or entity, including CWI departments, individuals, and ancillary organizations, that receives, maintains, processes or otherwise is permitted to access confidential information through its provision of services directly to CWI who manages significant information resources and systems for the purpose of making those resources available to others. This includes the Office of Information Technology, the Alumni Association, Registrar, and Financial Aid, as well as other entities that operate at a division, department, or sub-department level.

Information Technology (IT) Resources: An array of products and services that collect, transform, transmit, display, present, and otherwise make data into usable, meaningful and accessible information. IT Resources include but are not limited to: desktop computers, laptops, and tablet PC’s; handheld devices including but not limited to, cell phones; e-mail, voicemail, servers, central computers, and networks; cloud storage systems; network access systems including wireless systems; portable hard drives and databases; computer software; printers and FAX machines and lines; campus, classroom and office audio and visual display devices and switching, camcorders, televisions, physical media; telephone equipment and switches including local and long-distance services; satellite equipment and any other current or future IT resource adopted by CWI as new technologies are developed.

Level One Data: Private information that must be protected by law or industry regulation. This information is considered highly sensitive (“HS”).

Level Two Data: Information that should be protected. This information is considered moderately sensitive (“MS”).

Level Three Data: Publicly available information. This information is considered non-sensitive (“NS”).

Managers: Members of the CWI community who have management or supervisory responsibilities, including deans, department chairs, directors, department heads, group leaders, supervisors and faculty who supervise teaching or research assistants.

Minimum Security Standards (“MSS”): Required configuration standards, maintained by the Office of Information Technology, that increase the security of systems (servers, workstations, mobile devices) and help safeguard CWI’s information technology resources and data.

Protected Health Information (“PHI”): Individually identifiable health information that is maintained in any medium or transmitted or maintained in any other form. PHI excludes individually identifiable health information in education records covered by the Family Educational Rights and Privacy Act (FERPA), and records held by a covered entity in its role as an employer.

User: Anyone who uses CWI’s information resources, even if they have no responsibility for managing the resources. This includes students, faculty, staff, contractors, consultants, and temporary employees.

Policy

This policy creates an environment that will help protect all members of the CWI community from information security threats that could compromise privacy, productivity, reputation, or intellectual property rights. CWI recognizes the vital role data and information plays in its educational and research missions, and the importance of taking the necessary steps to protect information in all forms.

Given the large amounts of data and information generated by CWI employees and students, it is important everyone is familiar with the provisions of this policy. As more information is used and shared by students, faculty and staff, both within and outside CWI, an associated effort must be made to protect information resources from threats by establishing responsibilities, guidelines, and practices that will help CWI prevent, deter, detect, respond to and recover from compromises to these resources. All CWI data must be subject to some protective measures. This policy classifies CWI data into categories in order to apply appropriate protective security measures.

Users are responsible for protecting the information resources to which they have access. Their responsibilities cover both computerized and non-computerized information and information technology devices they use or possess, including but not limited to paper, reports, books, film, microfiche, microfilms, recordings, computers, PDAs, disks, jump drives/memory sticks, printers, phones, and fax machines. Users must follow the information security practices set by the ISO, as well as any additional departmental or other applicable information security practices.

Guidelines

I. Data Classifications

  1. CWI data is classified among three levels: One, Two, and Three. All data, regardless of classification, must be protected as per CWI’s MSS.
    1. Level One (HS) Data: This is the most sensitive data and it must never be left unattended without being properly secured. This includes CWI data protected by:
      1. Federal or State law (for example, HIPAA; FERPA; Sarbanes-Oxley; Gramm-Leach-Bliley; and HHS 45 CFR § 46 Protection of Human Subjects Subparts A-E);
      2. Industry Regulation (for example, PCI-DSS);
      3. CWI rules and regulations;
      4. Contractual agreements requiring confidentiality, integrity, or availability considerations (for example, Non-Disclosure Agreements, Memoranda of Understanding, Service Level Agreements, Granting or Funding Agency Agreements).
    2. Level Two (MS) Data: This data includes internal data used for official CWI business. While there might not be a specific statute or regulation requiring its protection, this data should be safeguarded due to proprietary, ethical, or privacy considerations and must be protected from unauthorized access, modification, transmission, storage or other use.
    3. Level Three (NS) Data: This data includes information that may or must be open to the public and has no existing local, national, or international legal restrictions on access or usage.

II. Security Protection Measures

  1. Detailed security measures for protecting data can be found at Minimum Security Standard for Systems on the Information Technology Resources homepage. Additionally:
    1. Questions about this standard should be addressed to the Information Security Office.
    2. Questions about properly classifying specific pieces of information should be addressed to department managers.
    3. CWI data stored on non-college IT resources must still be verifiably protected according to the MSS.

III. Group Responsibilities

  1. All users share in the responsibility for protecting information resources for which they have access or of which they have custody. Responsibilities set forth in this section are assigned to four groups: custodians, users, managers (of users), and information service providers. Individuals may have responsibilities in more than one area and should be familiar with the requirements of each group.
    1. Custodians are responsible for:
      1. Establishing information security procedures;
      2. Determining Authorizations;
      3. Recordkeeping; and
      4. Incident Handling and Reporting.
    2. Users are responsible for:
      1. Being familiar with and adhering to CWI policies;
      2. Physical security;
      3. Information storage;
      4. Distribution and transmission of information;
      5. Destruction and disposal of information and devices;
      6. Passwords;
      7. Computer security;
      8. Remote access;
      9. Logging off;
      10. Virus and malicious code protection;
      11. Backups; and
      12. Incident handling and reporting.
    3. Managers must fulfill the responsibilities of Custodians and Users set forth above, plus Managers are responsible for:
      1. Sharing responsibility for information security with the employees they supervise;
      2. Establishing information security procedures;
      3. Managing authorizations;
      4. User training and awareness;
      5. Physical security; and
      6. Incident handling and reporting.
    4. Information Service Providers are responsible for:
      1. More extensive information security requirements than individuals;
      2. Establishing information security procedures;
      3. Physical security;
      4. Computer security;
      5. Network security;
      6. Access controls;
      7. Passwords;
      8. Contingency planning; and
      9. Incident handling and reporting.

IV. Administrative Responsibilities

  1. The ISO continually monitors the college information security threat landscape and proposes tools or mitigation strategies to reduce the CWI’s exposure. Oversight and responsibilities include:
    1. Policy, procedures and standards review, enhancement and revision;
    2. User security training and awareness;
    3. Oversight authority for college networks and systems security;
    4. Incident handling, remediation, and reporting; and
    5. Collaborating with college departments as needed to ensure policy conformance.
  2. Legal counsel for CWI is responsible for interpreting the laws that apply to this policy and ensuring that the policy is consistent with those laws and other CWI policies. Any inadequacies in this policy should be brought to the attention of the ISO. CWI’s legal counsel will work in concert with the ISO and other parties deemed necessary to report any criminal offenses when necessary.
  3. The Office of Information Technology (IT) is responsible for working with the ISO to develop standards consistent with this policy, other CWI policies, and state and federal law. IT will also work with the ISO to assist with training and compliance issues

V. Enforcement

  1. Violations of this policy will be handled consistent with CWI disciplinary procedures applicable to the relevant individuals or departments, up to and including termination or dismissal. Failure to comply with this policy may also result in the suspension of access to network resources until policy standards have been met. Should CWI incur monetary fines or other incidental expenses from security breaches, CWI may recoup these costs from the non-compliant department, school or auxiliary organization.

IT 090 - Personal Computer Equipment And Software Support

Number

IT 090

Purpose

To define the responsibilities, guidelines, and terms of use for user owned mobile devices configured for CWI data use and that can access CWI’s electronic resources.

Department

Information Technology

Effective

December 1, 2016

Last Revision

December 19, 2016

Scope

This policy applies to all users who utilize either CWI-owned or personally-owned Mobile Devices to access, store, back up, relocate or access any CWI resources or information.

Definition

College Computing Resources: Computer hardware, software, data and network resources used and/or provided by CWI, including applications, intranet web access and CWI email/calendar/contacts.

Device Management: Management, security, and monitoring of all Mobile Devices that have access to College Computing Resources.

Mobile Device: Employee provided smartphone, tablet or laptop to be used to perform CWI-related work or educational activities.

User: Anyone who uses CWI’s information technology resources, even if they have no responsibility for managing the resources. This includes students, faculty, staff, contractors, consultants, and temporary employees.

Policy

CWI’s IT resources are provided to support CWI and its academic and service missions, its business and administrative function, and its student and campus life activities. CWI takes every precaution to protect the integrity and confidentiality of data that resides within CWI’s technology infrastructure. This policy is intended to prevent this data from being deliberately or inadvertently stored insecurely on a mobile device or transferred over an insecure network where it can potentially be compromised. A breach of this type could result in loss of information, damage to critical applications, financial loss, and damage to CWI’s public image. Users who bring personal devices to campus and use CWI’s IT resources must comply with state and federal laws and regulations, the guidelines in this policy, executive orders and policies of the Idaho Technology Authority (ITA) and the Idaho State Board of Education, and any other applicable CWI policies. Access to CWI resources and information is a privilege, not a right. Consequently, users are not automatically guaranteed the initial or ongoing ability to use these devices to gain access to CWI networks and information.

Guidelines 

Information Technology Responsibilities

  • Information Technology (IT) is responsible for configuring and supporting the User’s Mobile Device to access College Computing Resources, such as CWI wireless for staff and guests.
  • IT will provide configuration documentation for, and assistance with, Virtual Private Network (VPN) connectivity for remote access to CWI’s network by employees who are authorized to have such access.
  • IT is not responsible for backing up or restoration of critical data stored on personally-owned computing equipment.

User Responsibilities

  • The User is responsible for using College Computing Resources on his/her personal Mobile Device within the same constraints as on a CWI-owned device by adhering to all device and network acceptable use guidelines referenced herein and in any other applicable CWI policy.
  • The User will not download or transfer sensitive business data to his/her Mobile Device.
  • The User will password-protect his/her Mobile Device.
  • The User must maintain the original Mobile Device operating system and keep the device current with security patches and updates, as released by the manufacturer. • The User is responsible for any virus, adware, and spyware removal.
  • The User is responsible for any software installed on his/her Mobile Device including the operating system and any home related network software or drivers.
  • The User agrees to delete any sensitive business files that may be inadvertently downloaded and stored on his/her device through the process of viewing email attachments.
  • The User will not backup, download, or transfer sensitive business data or documents to any third party service such as Dropbox or personal OneDrive.
  • The User is responsible for all Mobile Device support requirements, including the cost of repairs, diagnostics or replacement.

Appropriate Use 

  • For personal computers and equipment, CWI IT offers limited technical support for issues related directly to classes only. This support includes help with:
    • Wireless Internet access
    • MyCWI
    • Blackboard
    • Classroom and Conference room presentation

Cloud Based Storage

  • Users are encouraged to use network or cloud based storage for any files that are accessed with Mobile Devices. This includes:
    • SharePoint sites
    • Network Drives
    • CWI provided OneDrive

Jailbroken Or Rooted Devices

Jailbroken Apple iOS devices, rooted Android devices, and other similar devices pose a risk to CWI data contained within the secure communications app. Therefore, CWI will disable or remove CWI data access on Mobile Devices determined to be jailbroken or rooted.

Access Control

  • IT reserves the right to refuse, by physical and non-physical means, the ability to connect Mobile Devices to CWI and CWI-connected infrastructure. IT will engage in such action if it feels such equipment is being used in a way that puts CWI’s systems, data, and users at risk.
  • All Mobile Devices attempting to connect to CWI’s network through an unmanaged network (i.e. the Internet) will be inspected using technology centrally managed by CWI’s IT department. Mobile Devices that are not in compliance with IT security policies, or represent any threat to CWI’s network or data, will not be allowed to connect.
  • Remote laptop computers or personal PCs for employees may only access CWI’s network using a VPN connection.
  • Upon successful connection to the VPN, the Employee’s remote device will be inspected for minimum virus protection, operating system versions and security. The connection will be refused if the minimum levels are not present.

Security

  • Employees using Mobile Devices and related software for network and data access must, without exception, use secure data management procedures. All Mobile Devices must be protected by a strong password. Employees agree to never disclose their passwords to anyone.
  • IT reserves the right, through policy enforcement and any other means it deems necessary, to limit the ability of users to transfer data to and from specific resources on the CWI network.
  • IT can and will establish audit trails which may be accessed and used without notice. Such trails will be able to track the attachment of an external device to a PC, and the resulting reports may be used for investigation of possible breaches and/or misuse. The user agrees to and accepts that his/her access and/or connection to CWI’s networks may be monitored to record dates, times, duration of access, etc., in order to identify unusual usage patterns or other suspicious activity. This is done in order to identify accounts or computers that may have been compromised by external parties. In all cases, data protection remains CWI’s highest priority.

Copyright

  • CWI actively monitors all media being downloaded or uploaded using CWI’s College Computing Resources. At no time should a user attempt to access, copy, upload or download any copyrighted material.
  • Upon detection of copyrighted material on the CWI’s network, the user will be notified of the violation with a warning. 
  • Subsequent violations may result in the termination of access to CWI’s College Computing Resources.

Privacy

  • Users shall have no expectation of privacy related to mobile devices when connected to or using CWI’s College Computing Resources. CWI monitors, tracks and audits connectivity usage of all CWI College Computing Resources.

Policy Non-Compliance

  • Failure to comply with this policy may, at the full discretion of CWI, result in the suspension of any or all technology use and connectivity privileges and corrective action up to and including termination, and for students, suspension and/or expulsion.

IT 100 - Information Technology Procurement

Number

IT 100

Purpose

To provide a framework for the procurement of all IT hardware, software, and any externally-hosted systems or software for CWI.

Department

Information Technology

Effective

December 1, 2016

Last Revision

December 19, 2016

Scope

Applies to the procurement of all IT hardware, software and any externally-hosted systems or software.

Definition

User: Anyone who uses CWI’s information technology resources, even if they have no responsibility for managing the resources. This includes students, faculty, staff, contractors, consultants, and temporary employees.

Policy

CWI has established standards for desktop software, operating systems, computer networks and computer hardware and peripherals. This standardization is essential as it allows CWI’s IT Department to provide quality service. The main benefits are:

  • IT support staff are familiar with hardware and peripherals, thus speeding up fault finding.
  • The IT Department is able to stock standard spares in order to reduce down time.
  • Network, software and hardware installations are planned and coordinated centrally by experienced network engineers.
  • CWI is able to recruit IT staff with relevant skills. This policy outlines the procedures that must be in place to achieve these benefits and to ensure the purchase, delivery and installation of IT equipment is coordinated successfully. This policy has been developed in conjunction with CWI’s Administration and Business Office.

Guidelines

The IT Department is the sole authority for placing orders for IT software and hardware on behalf of CWI regardless of the source of funding. All IT-related purchases must have full approval and authorization prior to requisitioning. All IT-related hardware and software will be specified by IT. Hardware and software cannot be purchased without approval by IT. All equipment or software purchase requests, whether as individual items or as part of a larger project, must be sent to IT which will process the request pursuant to this policy.

  • The IT Department will determine whether to approve, decline or amend the requirements for the purchase of the equipment.
  • If an equipment or software purchase request is declined or changed, the IT Department will provide a brief explanation to the requesting manager. The IT Department will keep the requesting manager informed of the decision and the outcomes if ordered.
  • If the equipment purchase request is approved, with or without changes, IT will order the equipment directly from CWI’s suppliers. Where an equipment purchase is authorized and ordered, an installation window will be proposed; however this may change according to IT priorities.
  • The IT Department has a standard set-up procedure for new hardware, software and systems. This procedure ensures the equipment is configured correctly and that all IT security measures are addressed. This procedure includes the setup of passwords, anti-virus software, security marking the equipment and adding it to the CWI asset management database;
  • The IT Department will not install software or hardware unless it has been involved in the specification of both. Hardware and software may not be installed by non-IT staff.
  • The IT Department will ensure that all of CWI’s policies, procedures and SOPs are followed when setting up software and hardware.
  • Installation of replacement equipment will be given priority over new equipment in order to maintain continuity of the existing service.
  • This policy may be reviewed and updated at any point depending upon current strategy.
  • Further information on this policy can be obtained from the IT Department

External IT Purchasing 

External IT Services include: hosting of software, accessing third party software (except via the internet), maintenance/support services and any other third party supplied IT related service.

  • All requests for External IT Services must be submitted to the IT Department.
  • The IT Department is the sole authority for placing orders for External IT Services
  • The IT Department will make a decision whether to approve, decline or amend the requirements for purchasing of these services.
  • If External IT Services are declined or changed, the IT Department will provide a brief explanation to the requesting manager for the decision. The IT Department will keep the requesting manager informed of the decision and the outcomes if ordered.

Substantial IT Investment

  • Purchases involving substantial IT investment (>$50k) must be authorized by the IT Department.
  • The IT Department MUST be consulted as part of the Business Case preparation as they will advise on the best solution and ensure that it meets user requirements, represents the best value for the money, is compatible with current CWI infrastructure requirements and fits with the overall CWI strategy.
  • Funding for projects of this size must have been budgeted and authorized prior to submission to the IT Department for approval.
  • Once the IT Department has approved the proposal and prioritized the work accordingly, IT will manage the implementation of both hardware and software utilizing standard project management methodology.
  • In all cases, the IT Department must be represented on any project/program for investments of this nature.

Computer Replacement

  • CWI has a five-year replacement policy for desktops and laptops.
  • A standard range of equipment is available; however, special needs may be accommodated. Special requests for non-standard or additional equipment should be made to the IT Department. Requests will be considered on an individual basis provided that no equivalent specification is available from standard equipment.
  • Employees are limited to a single desktop PC. If the employee needs to be out of the office for periods of time, a laptop can be provided instead of the normal desktop PC/Terminal. Where a laptop is provided, a desktop docking station and monitor can also be supplied for use in the office. Exceptions require presidential approval.

IT 110 - Mobile Computing

Number

IT 110

Purpose

To ensure secure, reliable and accountable use of mobile computing and storage devices containing CWI data by establishing unified management of and formally assigning roles and responsibilities with respect to the use of such devices.

Department

Information Technology

Effective

December 1, 2016

Last Revision

December 19, 2016

Scope

Applies to all mobile computing and storage devices used by CWI’s users in the performance of their duties and to all CWI data when accessed through, or stored on, mobile computing and storage devices, regardless of the device’s ownership.

Definition

Mobile Computing Devices: Small devices intended primarily for the access to or processing of data, which can be easily carried by a single person and provide persistent storage. Current examples include, but are not limited to, laptop, notebook, netbook and similar portable personal computers, as wells as smartphones and PDAs (Android, Blackberry, iPhone, and others).

Mobile Storage Devices: Media that can be easily carried by a single person and provide persistent storage. Current examples include, but are not limited to, magnetic storage devices (diskettes, tapes, USB hard drives), optical storage devices (CDs, DVDs, magneto-optical disks), memory storage devices (SD cards, thumb drives), and portable devices that make nonvolatile storage available for user files (cameras, MP3 and other music players, audio recorders, smart watches, and cell phones).

Restricted Data: Data in any format collected, developed, maintained or managed by or on behalf of CWI, or within the scope of CWI activities that are subject to specific protections under federal or state law or regulations or under applicable contracts. Examples include, but are not limited to, medical records, social security numbers, credit card numbers, drivers licenses, non-directory student records, research protocols and export controlled technical data.

User: Anyone who uses CWI’s information technology resources, even if they have no responsibility for managing the resources. This includes students, faculty, staff, contractors, consultants, and temporary employees.

Policy

CWI is committed to and encourages an open and collaborative environment through the use of mobile devices to facilitate interaction among Users. However, mobile computing devices and mobile storage devices that connect to CWI’s servers or contain CWI Restricted Data can be a substantial security risk for CWI. To reduce that risk, CWI has adopted the following guidelines.

Guidelines

  • All mobile computing devices and mobile storage devices that access the CWI Intranet and/or store CWI Restricted Data must be compliant with CWI Information Security Policies and Standards. CWI information security policies applicable to desktop or workstation computers also apply to mobile computing and mobile storage devices.
  • Restricted Data stored on mobile computing and storage devices must be encrypted.
  • Any and all mobile computing and mobile storage devices used within CWI’s information and computing environments must meet all applicable CWI encryption standards.
  • Mobile devices purchased with CWI funds, including but not limited to contracts, grants, and gifts, must also be recorded in the CWI IT assets inventory.
  • CWI’s Chief Information Officer will establish standards to govern the secure use of all mobile computing and storage devices at CWI.
  • CWI’s Chief Information Officer will provide guidance to assist departments and units in complying with these requirements.
  • All CWI managers, in conjunction with IT support teams, are responsible for ensuring all existing users of mobile computing and storage devices within their areas of responsibility are compliant with CWI policies and standards.
  • All Users who are currently using personally-owned mobile computing and storage devices that access the CWI Intranet and/or store CWI Restricted Data are required to bring their personal device into compliance with the CWI Information Security Standard for mobile computing and storage devices.
  • All Users will report the loss or theft of a mobile computing or storage device to the Help Desk (562-3522) immediately upon detection of the loss. CWI’s Chief Information Officer must be immediately notified of theft or loss of any mobile computing device or mobile storage device that contains Restricted Data. CWI’s Restricted Data may not be released for storage on, or access through, devices that do not meet these requirements.
  • Failure to comply with these guidelines may result in suspension or termination of connectivity privileges and/or corrective action, up to and including termination or expulsion.

IT 120 - Electronic Mail

Number

IT 120

Purpose

To provide ownership, allowable use, privacy, and retention guidelines for all Users of CWI E-mail Facilities.

Department

Information Technology

Effective

December 1, 2016

Last Revision

December 22, 2016

Scope

Applies to all students, faculty, staff, contractors, consultants, temporary employees, guests, volunteers and all other entities or individuals with access to electronic mail (e-mail) provided by CWI.

Definition

CWI E-mail Facilities: Includes all facilities, technology, information resources, and computing and electronic communication devices, hardware, software, and services required to accomplish the processing, storage, transmission, and communication of electronic mail, whether individually controlled or shared, stand-alone, or networked.

Electronic mail (E-mail): a message distributed by electronic means from one User to one or more recipients via a network.

Official CWI E-mail Account: Account with e-mail address of the form @cwi.edu or @my.cwi.edu. An Official CWI E-mail Account is provided to faculty, staff, students, and other individuals granted e-mail privileges at CWI.

User: Anyone who uses CWI’s information technology resources, even if they have no responsibility for managing the resources. This includes students, faculty, staff, contractors, consultants, and temporary employees.

Policy 

CWI provides CWI E-mail Facilities that enable electronic mail (e-mail) communication by Users. The use of CWI Email Facilities is expected and encouraged to facilitate the exchange of useful information in support of CWI’s mission. Members of the CWI community are expected to use CWI E-mail Facilities in a responsible and ethical manner.

Guidelines

Ownership Of Electronic Mail System

CWI E-mail Facilities are owned by and the property of CWI. E-mail is an official means for communication at CWI. Therefore, CWI has the right to send communications to Users via Official CWI E-mail Accounts and the right to expect that those communications will be received and read by Users in a timely fashion. CWI reserves the right to operate its E-mail Facilities as needed for its educational and administrative services.

Allowable Use 

CWI E-mail Facilities are provided for activities and associated administrative functions supporting CWI’s mission. Any use of CWI E-mail Facilities should be related to CWI business, including academic pursuits. The use of CWI Email Facilities for teaching and learning is encouraged. Incidental and occasional personal use of CWI E-mail Facilities may occur when such use does not increase costs for CWI or interfere with CWI’s mission or operations. Such incidental use is subject to the provisions of this policy.

Users of CWI E-mail Facilities may redirect communications from an Official CWI E-mail Account to another e-mail address but will retain the responsibility to monitor official communications. Any User who forwards his/her CWI e-mail to another e-mail address expressly assumes all responsibility for delivery beyond the @cwi.edu or @my.cwi.edu domains. CWI is not responsible for forwarded e-mail from other e-mail systems.

Uses Not Allowed 

CWI Email Facilities shall be used in an ethical and responsible manner. The following are prohibited uses of CWI Email Facilities:

  • To threaten, harass, or intimidate others.
  • To conduct non-CWI supported fundraising or public relations activities.
  • To transmit statements to incite violence or promote the use of weapons.
  • For purposes prohibited by law, regulation, or CWI policy.
  • To send e-mail that appears to be from someone else (“spoofing”).
  • To violate the privacy of any student or employee.
  • To assist in breaching computer system security.
  • To conduct private business operations not connected with CWI projects.
  • For electoral or issue-oriented political campaigning.
  • To send large volumes of unsolicited e-mail (“spam”) across systems.

Public Record And Privacy

While CWI respects the privacy of Users and does not wish to inspect or monitor the use of CWI E-mail Facilities routinely or to be the arbiter of message content, Users should not have any expectation of privacy or confidentiality as to any e-mails sent or received using CWI E-mail Facilities or an Official CWI E-mail Account. As a public institution of higher education, CWI is subject to the public records laws of the state of Idaho. Any e-mail sent by Users at CWI may be considered a public record subject to public disclosure as required by law. Use of private email in any manner for CWI-related purposes may cause that e-mail account to be subject to public records laws.

CWI reserves the right to access messages and data stored on or transmitted using CWI E-mail Facilities or Official CWI E-mail Accounts at any time for purposes including but not limited to:

  • Complying with legal requests for information.
  • Rerouting or disposing of undeliverable mail.
  • Maintenance of computer system security.
  • Investigating reports of violation of policy or law.
  • Troubleshooting hardware and software problems.

Message Retention

The nature of e-mail messages makes them difficult to rely upon as a permanent record. E-mail communications at CWI are not considered to be “record copies” and are transitory, held for convenience, and may be deleted. Users should be aware that messages may or may not be permanent. Also, the confidentiality of any message should not be assumed. Even when a message is deleted, it may be possible to retrieve and read that message. CWI reserves the right to review and retrieve e-mail communications for all lawful purposes. In addition, CWI may be required to put a hold on certain e-mail communications to prevent their deletion. Affected Users will be advised of any such hold.

Violation Of Policy

Any violation of this policy may result in corrective action up to and including termination of employment and/or suspension or expulsion in the case of a student.

IT 130 - Network Standards

Number

IT 130

Purpose

To provide the standards for the establishment of CWI’s networking infrastructure.

Department

Information Technology

Effective

December 1, 2016

Last Revision

December 22, 2016

Scope

Applies to CWI’s networking infrastructure in all buildings owned and/or operated by CWI, CWI’s networking infrastructure that provides connectivity between all CWI buildings, and any vendors used in support of the infrastructure.

Definition

Data Center: The infrastructure provided by a third party to house mission critical applications and hardware. This infrastructure is for facilities leased by CWI and should always be in a facility or building not owned or operated by CWI. The Data Center provides high availability for power and carrier access to be able to provide redundant and highly available infrastructure for CWI’s mission critical applications.

Independent Distribution Facility (IDF): The IDF is the Telco room in a building that contains the switching and cabling termination points for a LAN. There can be multiple IDF’s in one building. A Data Center cannot reside in an IDF.

Information Technology (IT) Resources: An array of products and services that collect, transform, transmit, display, present, and otherwise make data into usable, meaningful and accessible information. IT Resources include but are not limited to: desktop computers, laptops, and tablet PC’s; handheld devices including but not limited to, cell phones; e-mail, voicemail, servers, central computers, and networks; cloud storage systems; network access systems including wireless systems; portable hard drives and databases; computer software; printers and FAX machines and lines; campus, classroom and office audio and visual display devices and switching, camcorders, televisions, physical media; telephone equipment and switches including local and long-distance services; satellite equipment and any other current or future IT resource adopted by CWI as new technologies are developed.

Local Area Network (LAN): The infrastructure used to provide connectivity within a single building or portion of a building owned and/or operated by CWI. This can be physical infrastructure, such as cabling or switches, or can be a wireless network.

Main Distribution Facility (MDF): The MDF is the Telco room that houses the network core for a particular building and is the focal point for the WAN entering the building and the LAN servicing the building. The Data Center would be considered an MDF.

Telecommunications Rooms (Telco): The secure room that houses the electronics and network cabling for the LAN at each building. Telco rooms can be centrally located, or can be dispersed throughout a building depending on the layout of the building. Multiple floor buildings will typically have an MDF and several IDF rooms. The WAN connection for a building will be in the MDF. IDFs will typically only have switching and cabling for the LAN in a particular section of a building.

User: Anyone who uses CWI’s IT Resources, even if they have no responsibility for managing the resources. This includes students, faculty, staff, contractors, consultants, and temporary employees.

Wide Area Network (WAN): The infrastructure used to provide connectivity between all of the buildings owned and operated by CWI. This can be a mix of several technologies and is usually provided by or leased from a third party or carrier.

Policy

CWI supports centralized network services to offer the most advanced technology available while ensuring stable and reliable services are maintained for the benefit of the CWI community. These standards are subject to change based on newly available technology, changes in the makeup of the CWI footprint and any change in the direction of technology support.

Guidelines

  1. The Information Technology Department (IT) is directly responsible for the network infrastructure
  2. IT is responsible for every aspect of the networking infrastructure which includes:
    1. All cabling, copper and/or fiber, installed at the College
    2. All hardware installed in the data center(s), MDFs and IDFs
    3. Monitoring all data connections and hardware for possible trouble or failures
    4. Maintenance of all hardware installed
    5. Managing the budget used to operate the infrastructure
  3. Redundancy
    1. Wherever possible and practical, the design of the network infrastructure will have redundancy in mind. Some examples of a redundant design are:
      1. Separate internet providers for the internet bandwidth at the Data Center
      2. Multiple routers and switches in the core network at the Data Center
      3. Multiple sources of power for the equipment at the Data Center
      4. Uninterruptable Power Systems (UPS) at the MDFs and IDFs for each building
      5. Multiple connections between devices using technology such as line aggregation, port channeling, and VPC.
  4. Telecommunications Rooms
    1. IT exclusively manages CWI’s Data Center(s), MDFs and IDFs in all buildings. Access to MDFs and IDFs is limited to IT staff only. Any exception to this must be coordinated with CWI’s Chief Information Officer (CIO).
    2. MDFs and IDFs will not be used for any storage other than equipment used in the operation of the network infrastructure.
  5. Best Practices 
    1. IT shall seek and adopt whenever possible best practices with regards to the acquisition, implementation, management and replacement of network infrastructure resources.
    2. IT will review and adopt appropriate standards and procedures that represent best practices.
  6. Documentation
    1. IT will maintain documentation of the network infrastructure data including:
      1. IP addressing ii. Network layout drawings
      2. Software levels
      3. Services provided
      4. Contact information
      5. Backup schedule
  7.  Availability
    1. IT will strive to ensure that all network resources are available to CWI 24 hours a day, 7 days a week. This includes all internet connectivity and wireless, telephone and data access.
    2. IT will monitor all aspects of the network so that a failure may be detected quickly.
    3. In the event of a failure of any system, hardware, software or connectivity, IT will work to repair and restore service as quickly as possible.
    4. IT will notify staff and management of any failure along with an estimated time for return of service.
  8. Wireless Networks
    1. IT will work with campus leadership to educate users on the shared responsibility of wireless access.
    2. CWI provides wireless access to computing and IT resources for users as part of the services offered to enhance productivity in the workplace. Wireless networks operate within a shared and finite radio spectrum. IT will maintain administrative rights over this spectrum on campus and remote CWI buildings to ensure fair and efficient allocation of resources.
    3. IT will manage the RF spectrum and reserve specific 20 MHz wide 5 GHz channels for use by non-IT departments and vendors. Departments and vendors shall only use the assigned channels.
    4. The spectrum usage applies to all device traffic and interference occurring in the following frequencies ranges:
      1. 800 and 900 MHz, industrial, scientific, and medical (IS) bands, all modes
      2. 2.21920-1930 MHz, all modes
      3. 2.4-5 GHz, all modes
      4. 4.9-6 GHz, all modes
    5. IT will grant, limit, or restrict access to the wireless spectrum within the physical spaces and on grounds owned and operated by CWI.
    6. IT will monitor the spectrum on a continuous basis, and may regulate all wireless activities at all institution sites, including remote offices and common areas.
    7. Should any device create harmful interference, IT may request or cause immediate deactivation of the device until such time as it can be reactivated without causing harmful interference.
    8. Access to wireless networks owned or operated by CWI imposes certain responsibilities and obligations and is granted subject to CWI polices, and local, state, and federal laws. Acceptable use of wireless networks includes, but is not limited to the following:
      1. Respecting system security mechanisms, and not taking measures designed to circumvent, ignore, or break these mechanisms;
      2. Showing consideration for the consumption and utilization of IT resources; and
      3. Assisting in the performance of remediation steps in the event of a detected vulnerability or compromise.
  9. Privacy Expectations
    1. While CWI respects Users’ rights to privacy, the institution cannot assure any level of privacy while using the CWI network infrastructure. Users are responsible for taking reasonable measures to ensure their own privacy on the wireless network.
    2. IT Resources must be available to support CWI’s mission. IT staff may need to inspect the resources to maintain or improve the function, if there is a suspicion of misconduct or if there may be a violation of federal, state, local law or evidence of violation of CWI policy.
    3. Offenders may be prosecuted under all applicable laws including but not limited to the Communications Act of 1934 (as amended), the Family Educational Rights and Privacy Act of 1974, the Computer Fraud and Abuse Act of 1986, the Computer Virus Eradication Act of 1989, the Idaho Computer Crimes statute, and the Electronic Communications Privacy Act.
    4. Individuals using wireless networks owned by CWI do so subject to applicable laws and CWI policies. Users assume all associated risks and agree to hold CWI and its employees harmless for: (1) the compromise of any personal information (e.g., credit card numbers); (2) any damage caused to Users’ hardware or software due to security issues; or (3) any other harm caused by viruses or hacking while on CWI wireless networks.
    5. CWI disclaims any responsibility and/or warranties for information and materials residing on non-CWI systems or available over publicly-accessible networks. Such materials do not necessarily reflect the attitudes, opinions, or values of CWI, its employees or students.

IT 140 - Software Patch Management

Number

IT 140

Purpose

To provide support for academics and the business of CWI by keeping software utilized by CWI up to date and patched with the most current updates as approved for deployment on the CWI network.

Department

Information Technology

Effective

December 1, 2016

Last Revision

January 17, 2017

Scope

Applies to all software on all servers and workstations utilized by users.

Definition

User: Anyone who uses CWI’s information technology resources, even if they have no responsibility for managing the resources. This includes students, faculty, staff, contractors, consultants, and temporary employees.

Policy 

Software is utilized on all servers and workstations to provide the applications utilized by users for academics and the day to day activities of CWI and for the systems that support the business critical applications. Updates to this software are provided by manufacturers to address known issues and security flaws. The software is released periodically and CWI’s IT Department will review the provided updates and plan appropriately for the installation of approved patches.

Guidelines 

  • Software patch management is the responsibility of the IT Department.
  • Patch Management will be controlled from a central location using software that can manage the patch installations and schedule automatic installation of approved patches to workstations.
  • The IT Department will review all patches and approve any updates prior to the update being scheduled.
  • The IT Department will monitor patch releases for any updates that may require immediate attention to address a known security issue.
  • Software patches and updates will be installed on client workstations with no notification to the User.