|D - 800.1||Acceptable Use
This term consists of these related concepts:
|D - 800.2||Authentication
Proving that devices or persons are who they say they are. The most common form of authentication is a user-id and password. The computer or electronic device must be capable of providing authentication.
|D - 800.3||Authorized User
Individual or entity permitted to make use of College computer or network resources. Authorized users include students, staff, faculty, alumni, sponsored affiliates, and other individuals who have an association with the College that grants them access to college IT resources.
|D - 800.4||College Electronic Data
Digital information that was created by or for the College or for which the College has a custodial responsibility.
|D - 800.5||Data Custodian
Representatives of the College who are assigned responsibility to serve as stewards of College data. They are responsible for developing procedures for creating, maintaining, and using college data, in compliance with applicable policies, procedures, and laws.
|D - 800.6||Data Owner
The principal supervisor responsible for ensuring proper management of the data over its lifetime.
|D - 800.7||Information Technology Resources
Facilities, technologies, and information resources used for information processing, transfer, storage, and communications. Examples include but not limited to computer labs, classroom technologies, computing and electronic communications devices and services, such as modems, e-mail, networks, telephones, voice mail, fax transmissions, video, multimedia, instructional materials.
|D - 800.8||Restricted Data
Data that does not fall within the definition of "public" data as defined by the Family Educational Rights and Privacy Act (FERPA) or College policies.
|D - 800.9||Security Incident
Intentional or accidental occurrence affecting information or related technology in which there is a potential loss of data confidentiality or integrity, or disruption of service.
|D - 800.10||Security Log
Events captured by the operating system or other software that are outside of established parameters. Examples include, but are not limited to, multiple log-on attempts within a short time period or attempted access of a protected file.
|D - 800.11||Security Measures
Processes, software, and hardware used by system and network administrators to ensure the confidentiality, integrity, and availability of the IT resources and data owned by the College and its authorized users. Security measures may include reviewing files for potential or actual policy violations and investigating security-related issues.
Content Owner: Donna Davis— email@example.com
Page Updated by: Jessica Trimborn
Date Issued: 07/30/07
Date Revised: 04/21/2010