Search12 Results
- Knowledge Base
- Professional and IT Services
- Data Center
Facility access, safety, conditions, operating, auditing, changes, standards.
- Knowledge Base
- Professional and IT Services
- Documentation Guidelines
It is a violation of the Code of Computing Practices for any user to commit copyright infringement using university resources. Copyright infringement can also result in civil and criminal penalties with fines ranging from $750 to $30,000 per work infringed.
- Knowledge Base
- Professional and IT Services
Policies and guidelines that are a part of an overall strategy to provide a secure and stable IT environment to support users, research, and university business.
- Knowledge Base
- Infrastructure
- Wi-Fi and Network
- Wi-Fi
The University of Arkansas wireless networking systems is an enterprise system covering external areas of the campus and interconnected building wireless networks. These systems are intended to allow campus users access to all campus computing facilities from mobile or portable devices such as notebook computers, tablets and smartphones.
- Knowledge Base
- Infrastructure
- Domain Name Services
Every computer on the internet is assigned a numerical IP address.
- Knowledge Base
- Security
- Safeguarding Data and Devices
This policy establishes requirements for how faculty and staff use mobile technology to access sensitive university data and university data resources.
- Knowledge Base
- Communication and Collaboration
- Campus Phone Services
Voice over Internet Protocol (VoIP) users on campus should be aware that emergency calls placed to 911 will report location based on Emergency Response Location (ERL) information. Maintaining accurate location information is vital to ensure first responders can quickly find the correct location of a call during an emergency.
- Knowledge Base
- Communication and Collaboration
- Web Publishing
Any personal home page or other personal collection of electronic material that is accessible to others must include the following disclaimer: "These materials are not endorsed, approved, sponsored, or provided by or on behalf of the University of Arkansas, Fayetteville."
- Knowledge Base
- Security
- Accounts and Access
- Multi-Factor Authentication (MFA)
The purpose of this policy is to provide guidelines for MFA connections to the University of Arkansas network and information systems on and off campus.
- Knowledge Base
- Security
The GLBA Safeguards Rule (16 CFR 314) (“the Rule”) requires the university to develop, implement, and monitor processes aimed at ensuring the security of certain nonpublic personal information obtained when the university offers or delivers (or offers or delivers on behalf of an affiliate) a customer a financial service or product.
- Knowledge Base
- Security
Appropriate security shall include, but is not limited to: protection of the privacy of information, protection of information against unauthorized modification or disclosure, protection of systems against denial of service, and protection of systems against unauthorized access.
- Knowledge Base
- Security
This summary is compiled to make possible a quick review of the terms and provisions of the University of Arkansas' Code of Computing Practices. By using a University of Arkansas computer account, you are deemed to have agreed to comply with the Code of Computing Practices and to know its provisions.