IT Security Standard: Computing Devices - Responsibilities

Designated Management Authority

  • Strictly observes all laws, regulations, policies, standards and procedures related to security of information and information technology resources in their area.
  • Responsible for and shall take reasonable measures for implementation of, and compliance with, the Computing Device Standard for devices within their areas.

Computing Device Administrators/Application Administrators

  • Strictly observes all laws, regulations, policies, standards and procedures related to security of information and information technology resources in their area.
  • Prepares and maintains procedures and documentation in compliance with the Computing Device Standard for assigned devices.
  • Executes device administration procedures in compliance with the Computing Device Standard for assigned devices.

Computing Device Users

  • Strictly observes all laws, regulation, policies, standards and procedures related to security of information and systems used.
  • Protects the privacy rights of University faculty, staff and students.
  • Protects the physical security of data and systems assigned to them.
  • Reports suspected violations of security policies and procedures for university data and systems to their supervisor who will report it to the Information Security Officer and/or Information Technology Services depending on the nature of the violation.

 


Return to Table of Contents

Related Content

Best Practices

10 Best Pactices

Our 10 Best Pactices

Contact Us

Contact Information Security at 756-7000

Contacts

Did you know?

Stay Safe Online Tips