Policies and Procedures
Malware Response | SharePoint Consent | Classroom Security Requirements | Accessibility Standards | Document Retention | Acceptable Use | iPad/Mobile Device Fitness Framework
Malware Response
Every year millions of computers are infected with viruses and other malware. Often time people don’t even know it. So, how do you keep your computer safe? Practicing safe internet browsing and keeping your system up to date are two ways to minimize the chance of infection. The campus works hard to keep faculty and staff safe from malware infection by deploying a host of technological and policy safeguards. All this is done to ensure that you can perform work that benefits the University while maintaining privacy and security.
So what do you do when you think you might be infected? What are some warning signs? Some signs might be your computer is suddenly behaving oddly. Other signs include random browser popups and your default home page changes without your consent. If you feel your system may have been compromised report it immediately by contacting the University help desk at x7777.
SharePoint Consent
Responsible management of campus resources begins with clear policies. The University provides a service for file sharing and collaboration called SharePoint. This web based tool enables faculty and staff to participate in collaborative projects. In order to gain access to this service the College has adopted a set of guidelines aimed at making using SharePoint effective and uncomplicated. We have created a consent form that must be read and understood before H&SS IT will create a SharePoint site for you. Please fill out the consent form found here and return a sign copy to H&SS IT Services Group office in H-720G.
Computer Classroom Security Requirements
The University takes a strong stance when it comes to protecting our students when using our computing resources. H&SS IT uses technology and policies to safeguard students using our computer labs and student centers. Antivirus and anti-spyware programs are running constantly in background to protect against breaches and loss of student privacy information. Computers in H&SS comply with University security policies and are monitor to ensure continued compliance. Visit here to read more about University published computer classroom security policy.
ATI/ADA 508 Accessibility Standards
CSU campuses have an obligation by law to provide access to resources to those that have disabilities. Specifically, section 508 articulates providing access to information technology to these individuals. In 2006 the CSU created the Accessible Technology Initiative which mandates that public website hosted by CSU are design with accessible features. CSUF following suite is charged with building accessibility into all electronic media and follows a strict set of standards to ensure compliance. For more information visit the ATI website.
To help navigate the complexity around creating an ADA 508 accessible web site and electronic documents the University has setup a website with information and training opportunities. Click here to learn more. If you are a web coordinator or web master for a department or Center within the College and are interested in finding out if your web site is ADA 508 compliant please contact Tina Phan (x3439) or email hsswebmaster@fullerton.edu.
Document Retention
CSU mandates that all electronic and non-electronic documents must be retained and disposed of in accordance with CSU Executive Order 1031. Click here to read about the order. Certain information may be needed in legal matters so a method for retaining this information is necessary. For more information on how to comply with Executive order 1031 and to see a list of record types visit the records retention website. To learn ways on how to retain and secure department work files please contact us at hssit@fullerton.edu or call x3200.
Acceptable Use
Governance around appropriate use of CSU technological resources is important to ensure a safe and secure computing experience. While academic freedom is the right and privilege of faculty and staff there are certain expectations that these resources will not be abused or misused. The CSU has defined a policy around acceptable or “responsible” use. Click here to view the CSU policy. To find out more contact the Information Security Office (x3765) or email iso@fullerton.edu
iPad/Mobile Device Fitness Framework
Mobile computing devices are one of those transformative technologies that bring innovation and excitement to the classroom. CSU Fullerton has embraced mobile technology by providing faculty an iPad. Mobile devices and in particular the iPad can be used to enhance student learning. H&SS IT would like to ensure faculty success by offering an iPad adoption framework. This framework provides an opportunity to clearly articulate how and why this technology will be used in the classroom while helping to ensure iPad use is contributing to student success. Click here to download a copy. To learn more contact Mitch Pautz (x7067).
