Appropriate Use IT Facilities and also ServicesThis? web page provides the NC State IT laws, guidelines as well as treatments relate to NC State staff members when using the computing and also data network sources supplied by the college. Universities and also departments might have additional regulations as well as treatments for the acceptable use of their IT facilities and solutions. See also All Policies, Rules as well as Rules in the Category: Infotech.NC State IT policies, regulations and proceduresPOL 08.00.01-- Computer Use PolicyThis? official policy controls the appropriate use the campus information network and computing sources for management, scholastic as well as personal usage. Some guidelines apply only to faculty and also team, who are state workers.Computer Usage Regulation Recap as well as Guidance (" plain English" version).REG 08.00.10-- Anti-virus Software Program Demands.This guideline mandates making use of authorized anti-viruses software application on all Windows and also Macintosh computers linked to the NC State network. See NC State Antivirus Resources.REG 01.25.02-- Copyright Infringement-- Policy Declaration. See also:.Peer-to-Peer (P2P) File Sharing.Copyright.REG 04.25.05-- Info as well as Communication Technology Ease Of Access.This policy defines just how NC State will fulfill its lawful obligations to supply university Details and interaction innovations, consisting of internet content, in styles that are accessible to individuals with impairments. For https://innovante.uk/ in adhering to this policy, see IT Ease of access at NC State.NC State College Password Standard.This document gives details of the guidelines regulating Unity account password stamina and password modification.Combined Pricing Initiative (CPI) at NC State.The college need to buy laptop computer and computer hardware with the Combined Prices Campaign procedure came to be effective November 8, 2010.Information Sensitivity Framework.This framework makes it possible for users of university information both to assess its sensitivity level as well as to protect it as necessary from risks which may include, yet not be limited to, unauthorized damage, adjustment, disclosure, gain access to, usage and also removal.RUL 08.00.13-- Network Printer Safety Requirement.This Policy describes the baseline technological security criteria required for Networked Printers attached to the university network. It likewise gives recommended ideal method guidelines for extra protection controls to execute.Info Safety And Security Recognition Kind (PDF).All employees must examine and also consent to stick to the content of this paper the first time they authorize into the MyPack? website.Guidelines for Non-Employees with System Management Duties.These standards appoint as well as delineate responsibilities for custody and also safety of college data by non-employees (e.g., contractors, experts, retirees) who operate as system managers on college resources.Regulations as well as procedures for university computer accounts as well as various other systems as well as services supported by the Office of Information Technology.Providers for professors as well as personnel.Computing Account Procedures for Faculty, Personnel and Visitors.Procedures for account development as well as deactivation.Email and also Calendaring.Gmail, Schedule, Google Office.Email Pen name.Mailing List Solutions.Unity Storage Locker Rental Solution.Procedures for acquiring extra Unity (AFS) documents area.Optical Mark Reading Service.Network & IT team resources.Network Protection Laws.Network Registration.Host enrollment.Rules for Execution of Wireless Networks at NC State.


トップ   編集 凍結 差分 バックアップ 添付 複製 名前変更 リロード   新規 一覧 単語検索 最終更新   ヘルプ   最終更新のRSS
Last-modified: 2022-02-18 (金) 04:01:08 (806d)