Information Security Policy
The following are Division of Information Technology security policies:
Only authorized personnel will be allowed entry to computer machine rooms and data wiring closets. These are persons needed to operate, supervise or provide maintenance to the area and its equipment.
Access to the system from outside the computer laboratories must be controlled with proper user ID and password codes which must be changed no less than three times a year.
All accounts for staff that separate from the University will be deleted or made inactive immediately. Passwords that the user had access to are changed. All keys are returned to the proper authorities.
The computer machine room and data wiring closets must have all network/server equipment connected to an uninterruptible power supply (UPS).
The computer machine room must have its own air conditioning system. The temperature and humidity levels will be monitored at all times.
Fire extinguishers should be the safest possible and checked for compliance regularly. Smoke detector(s) must also be installed. Smoking is strictly prohibited in the computer machine rooms, computer laboratories, and data wiring closets at all times.
All file systems must have a data backup procedure where data is being backed up on a regular basis. Some backup tapes will be kept onsite and other will be kept in a safety deposit box of campus. The same tapes will not be used night after night to guard against bad SAVES. The tapes will be logged and kept in a secure location. All backups must be tested regularly.
Anti virus software will be installed on all computers and updated regularly.
The Information Technology Division will cross-train staff to ensure that there are "backup staff" to perform critical operations.
Service maintenance and warranty agreements must be properly maintained on all servers, networks, and peripheral equipment.
All crucial equipment and information will be kept in secure locked areas to guard against theft. Network security equipment must also be installed and properly monitored and maintained. Additional security equipment such as cameras, key cards, etc can also be installed as necessary.
Any attempt to use Chicago State University computing systems and resources for the purposes of harassment, computer hacking, unauthorized use of another person's computer account, introduction of computer viruses, theft of information, or any activity that violates the integrity or interferes with the normal operation of the University's computer system or the work of another user is strictly prohibited.
Failure to comply with this policy will result in action which may include suspension of user privileges or other disciplinary action, including suspension or expulsion from the University or termination of University employment. In addition, violations may result in referral for prosecution by local state or federal authorities.