Policies and guidelines that are a part of an overall strategy to provide a secure and stable IT environment to support users, research, and university business.
Appropriate security shall include, but is not limited to: protection of the privacy of information, protection of information against unauthorized modification or disclosure, protection of systems against denial of service, and protection of systems against unauthorized access.
It is a violation of the Code of Computing Practices for any user to commit copyright infringement using university resources. Copyright infringement can also result in civil and criminal penalties with fines ranging from $750 to $30,000 per work infringed.
Every computer on the internet is assigned a numerical IP address.
The GLBA Safeguards Rule (16 CFR 314) (“the Rule”) requires the university to develop, implement, and monitor processes aimed at ensuring the security of certain nonpublic personal information obtained when the university offers or delivers (or offers or delivers on behalf of an affiliate) a customer a financial service or product.
Email is not recommended for sensitive matters that a user may not want disclosed.
The purpose of this policy is to provide guidelines for MFA connections to the University of Arkansas network and information systems on and off campus.
Voice over Internet Protocol (VoIP) users on campus should be aware that emergency calls placed to 911 will report location based on Emergency Response Location (ERL) information. Maintaining accurate location information is vital to ensure first responders can quickly find the correct location of a call during an emergency.
The University of Arkansas wireless networking systems is an enterprise system covering external areas of the campus and interconnected building wireless networks. These systems are intended to allow campus users access to all campus computing facilities from mobile or portable devices such as notebook computers, tablets and smartphones.
This policy defines who may enter the University of Arkansas Data Centers, based on specific criteria for escorted and unescorted access.