Search38 Results

Miami University permits the acquisition of computer peripheral devices and/or software within the limits of the operating budget and/or available extramural funding; the University statement of preferred, supported, and approved manufacturers; and the capacity or security of the host computers
Miami University provides telephone service, cellular service and devices, and photographic imaging devices for use in University business only
Miami University Records Management Program, in compliance with the Ohio Revised Code, ensures proper scheduling, storage, and disposal of University records. Records include any information stored on a fixed medium prepared or received in the normal course of business (paper, image, or digital) that documents the organization, functions, policies, decisions, procedures, operations, or other activities of the University
Miami University prohibits actions of theft or malicious destruction of computing property; unauthorized access to, use of, or control of computing facilities or computer data; obstructive or disruptive acts involving University Computing Resources; or use of University property in the performance of illegal or prohibited actions
Approved list for proper spelling of application, product, and service names, and IT-industry terminology
Miami University blocks P2P ports to eliminate network/Internet disruptions. EDUCAUSE provides a list of legal alternatives to P2P file sharing for music, movies, and TV shows at http://www.educause.edu/legalcontent
Miami University collects, stores, and distributes large amounts of information essential to the performance of University business. This information is a valuable University asset, a portion of which is protected by state and federal laws. The University has the right and obligation to protect, manage, secure, and control information (whether in hard copy or stored as electronic data) in its possession
Miami University community members must understand policies and legal requirements in order to exercise rights and responsibilities effectively and appropriately when using email