IT Services Policy Library


Articles (22)

Guide: Broadcast or bulk email messages

Miami University guideline provides protection to the Miami community and our electronic mail sources from unauthorized use of broadcast or bulk email messaging

Guide: Determine qualification of email (or any electronic correspondence) as a retainable record

Miami University guideline provides defining qualifications of email (or any electronic correspondence) as a retainable record

Guide: Document retention and destruction

Miami University guideline provides protection of documents and records containing confidential information from unauthorized access or disclosure

Guide: Tech resources for student organizations

Miami University student organizations may request email account(s), LISTSERV electronic email lists, or a Miami website alias through the Student Activities website or University IT Services

Policy: Computer Peripherals and Software Acquisition

Miami University permits the acquisition of computer peripheral devices and/or software within the limits of the operating budget and/or available extramural funding; the University statement of preferred, supported, and approved manufacturers; and the capacity or security of the host computers

Policy: Confidential Information

Miami University collects, stores, and distributes large amounts of information essential to the performance of University business. This information is a valuable University asset, a portion of which is protected by state and federal laws. The University has the right and obligation to protect, manage, secure, and control information (whether in hard copy or stored as electronic data) in its possession

Policy: Email

Miami University community members must understand policies and legal requirements in order to exercise rights and responsibilities effectively and appropriately when using email

Policy: Illegal or Unauthorized Use of University Computing Resources

Miami University prohibits actions of theft or malicious destruction of computing property; unauthorized access to, use of, or control of computing facilities or computer data; obstructive or disruptive acts involving University Computing Resources; or use of University property in the performance of illegal or prohibited actions

Policy: Institutional Analytics Information Governance

Miami University Institutional Analytics Information is readily accessible to members of the University community, while protecting confidential or sensitive information from accidental or unauthorized access

Policy: Mandatory MUnet password change

Miami University computing network (MUnet) users must change their MUnet passwords from the default, and then every 180 days or 365 days thereafter, depending on the complexity of the password provided

Policy: Payment Card Data Security

Miami University complies with Payment Card Industry Data Security Standards (PCI DSS) in order to receive payment via credit or debit cards. PCI DSS requires that certain elements of how we store, process, or transmit payment card data be codified in policy

Policy: Records Retention, Electronic Records, and Signatures

Miami University Records Management Program, in compliance with the Ohio Revised Code, ensures proper scheduling, storage, and disposal of University records. Records include any information stored on a fixed medium prepared or received in the normal course of business (paper, image, or digital) that documents the organization, functions, policies, decisions, procedures, operations, or other activities of the University

Policy: Responsible Use of University Computing Resources

Miami University Computing Resources include end-user computing devices, servers, networks, email, software, printers, scanners, video distribution systems, telephone systems, and other computing hardware and software, whether owned by the University or contracted from a third party

Policy: Student Email

Miami University-provided email address ( is an official means of communication; students are responsible for all University communication sent to their Miami email address

Policy: Telecommunications

Miami University provides telephone service, cellular service and devices, and photographic imaging devices for use in University business only

Policy: Unauthorized Peer-to-Peer File Sharing

Miami University blocks P2P ports to eliminate network/Internet disruptions. EDUCAUSE provides a list of legal alternatives to P2P file sharing for music, movies, and TV shows at

Policy: Video Surveillance

Miami University uses video surveillance technology to enhance campus safety and security and to help maintain an environment conducive to quality education, individual privacy, diversity, and freedom of expression

Rationale: Peer-to-Peer File Sharing Ban

Miami University blocks P2P ports to eliminate network/Internet disruptions. Some reasons involve technology; others do not. EDUCAUSE provides a list of legal alternatives to P2P file sharing for music, movies, and TV shows at

Standard: Active Directory Naming Objects

Miami University standard provides a consistent manner to identify the functional area responsible for a given object in the Active Directory, and to prevent collisions between objects in different organizational units

Standard: Mobile Device Security

Miami University standard decreases the likelihood of a security incident and loss of confidential information as a result of a mobile device being lost or stolen

Standard: Vulnerability Management

Miami University standard provides a consistent method by which to identify and mitigate vulnerabilities in Miami’s computing infrastructure in order to decrease the overall risk profile of the University