Information Technology Standard 10.1.0

Disciplinary Action Standard


Date of Current Revision or Creation:泭November 1, 2021


The purpose of an Information Technology Standard is to specify requirements for compliance with 圖朸厙 Information Technology policies, other University policies, as well as applicable laws and regulations. Standards may include business principles, best practices, technical standards, migration and implementation strategies, that direct the design, deployment and management of information technology.

Purpose

The purpose of this compliance standard is to establish general rules for how violations of information technology security policy and standards are handled.

Definitions

Information Technology Resources are defined as computers, telecommunication equipment, networks, automated data processing, databases, the Internet, printing, management information systems, and related information, equipment, goods, and services.

Data Users/Users - Individuals and organizations that access Institutional Data and Information in order to perform their assigned duties or to fulfill their role in the University community.

Standards Statement

Disciplinary Action

An information technology security violation is a serious offense that may result in the withdrawal of access and may subject the user to disciplinary action or academic sanctions consistent with University policies and procedures.

Disciplinary actions or academic sanctions will be assessed in accordance with the following:

  • Violations of IT security policy by a faculty member will be the basis for disciplinary action in accordance with the policy on Faculty Sanctions.
  • Violations of IT security policy by a faculty administrator will be the basis for disciplinary action in accordance with the Board of Visitors Policy on Administrative and Professional Faculty.
  • Violations of IT security policy by a staff member will be the basis for disciplinary action in accordance with
  • Violations of IT security policy by a student will be the basis for disciplinary action in accordance with BOV Policy 1530 Code of Student Conduct.

圖朸厙 reserves the right to revoke any user's access privileges at any time for violations of policy, standards and/or conduct that disrupts the normal operation of information technology resources. Authority may be exercised without notice.

Procedures, Guidelines & Other Related Information

History

Date

Responsible Party

Action

October 2009

ITAC/CIO

Reaffirmed

October 2010

ITAC/CIO

Reaffirmed

October 2011

ITAC/CIO

Reaffirmed

October 2012

ITAC/CIO

Reaffirmed

January 31 2013

IT Policy Office

Related information updated.

Numbering revision

August 2015 IT Policy Office/ISO Updated links, definitions. Three year review, reaffirmed.
August 2018 IT Policy Office/ISO Updated links, definitions. Three year review, reaffirmed.
November 2021 IT Policy Office/ISO Updated links. Three-year review, reaffirmed.