Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

A. Family Educational Rights and Privacy Act 00-01-25-05:00

VI. POLICY

...

  1. Actions that may represent a risk to the University's electronic information, information systems, or information technology infrastructure require a timely response to mitigate the risk to those assets and to the University's business services and operations.

...

  1. To assist with these efforts, all members of the Rowan community must report any computer activity they believe to be suspicious or consider an unauthorized attempt to access, use, steal, or damage Rowan's electronic information, information systems, or information technology infrastructure (this includes missing computer equipment). Such security events can potentially negatively impact the confidentiality, integrity, and/or availability of the University's electronic information and information systems and threaten its businesses and overall mission. Reporting these events helps the University assess the risk and respond accordingly.

...

  1. Members of the Rowan community should use their best judgment and err on the side of caution when deciding whether to report activity they believe may be suspicious or that constitutes a threat to the University or their respective organization.

VII. NON-COMPLIANCE AND SANCTIONS

...

B. Attachment B, Reporting Suspicious Computer Activity and/or Stolen Computer Equipment

 C. Attachment C, Response To Suspicious Computer Activity and/or Stolen Computer Equipment

...