Search19 Results

Miami University permits the acquisition of computer peripheral devices and/or software within the limits of the operating budget and/or available extramural funding; the University statement of preferred, supported, and approved manufacturers; and the capacity or security of the host computers
Miami University provides telephone service, cellular service and devices, and photographic imaging devices for use in University business only
Miami University Computing Resources include end-user computing devices, servers, networks, email, software, printers, scanners, video distribution systems, telephone systems, and other computing hardware and software, whether owned by the University or contracted from a third party
Miami University Records Management Program, in compliance with the Ohio Revised Code, ensures proper scheduling, storage, and disposal of University records. Records include any information stored on a fixed medium prepared or received in the normal course of business (paper, image, or digital) that documents the organization, functions, policies, decisions, procedures, operations, or other activities of the University
Miami University prohibits actions of theft or malicious destruction of computing property; unauthorized access to, use of, or control of computing facilities or computer data; obstructive or disruptive acts involving University Computing Resources; or use of University property in the performance of illegal or prohibited actions
Miami University blocks P2P ports to eliminate network/Internet disruptions. EDUCAUSE provides a list of legal alternatives to P2P file sharing for music, movies, and TV shows at http://www.educause.edu/legalcontent
Miami University uses video surveillance technology to enhance campus safety and security and to help maintain an environment conducive to quality education, individual privacy, diversity, and freedom of expression
Miami University computing network (MUnet) users must change their MUnet passwords from the default, and then every 180 days or 365 days thereafter, depending on the complexity of the password provided
Miami University guideline provides protection of documents and records containing confidential information from unauthorized access or disclosure
Miami University standard provides a consistent manner to identify the functional area responsible for a given object in the Active Directory, and to prevent collisions between objects in different organizational units
Miami University standard provides a consistent method by which to identify and mitigate vulnerabilities in Miami’s computing infrastructure in order to decrease the overall risk profile of the University
Miami University standard decreases the likelihood of a security incident and loss of confidential information as a result of a mobile device being lost or stolen