SlideShare a Scribd company logo
1 of 1
Access to Student Information (Policy4455)                             KAGL University 2012-2013


Policy 4455: Access to Student Information

At KAGL University, it is our mission to keep student information private while facilitating
communication between students and organizations that may benefit them. In addition to
adhering to all federal, state, and local laws governing information privacy, we plan to keep
students safe by:

   1. Allowing students to choose which organizations they receive information from. The
      students will have a two-week window at the beginning of each semester during which
      they may opt out of communications from groups they do not wish to be affiliated with.
      The only exception will be that students may not opt out of receiving communication
      from areas of the university that will directly affect their enrollment status or academic
      standing (i.e. - bursar, registrar, etc.)
   2. Those wishing to be included on the list of possible organizations allowed to
      communicate with students via university technology systems must go through a
      screening process to ensure that they will not sell student information to third parties,
      engage in identity theft, fraud, or negatively impact students in any other way.
   3. All computers used by the university will have anti-virus software to ensure the safety of
      current students.
   4. Any computer used by the university will have their hard drive removed before being
      discarded to ensure that information of current/former students cannot be accessed in the
      future. Two informational technology technicians will be assigned to each computer
      being discarded or donated to ensure that they have been fully re-imaged before going off
      campus.
   5. Individuals or Organizations wishing to receive donated computers from the university
      will go through a screening process similar to that of other organizations wishing to gain
      access to student information.

Individuals or Organizations who do not adhere to this policy will be subject to disciplinary
actions by the Informational Technology Review Board. These include but are not limited to:

   1. For the first offense, disciplinary action may include a fine and probationary period
      during which the individuals will be monitored. If the breach of policy is illegal in nature
      or compromises the safety of the students, the organization will be reported directly to
      authorities and will be denied access to student information and communication.
   2. For the second offense, termination of employment for university employees is possible.
      Organizations and individuals breaking this policy for the second time will instantly be
      excluded from electronic access to communication with students and will be taken off the
      computer donation list.

More Related Content

Viewers also liked

Fit 5_2015_Liikuntakansi
Fit 5_2015_LiikuntakansiFit 5_2015_Liikuntakansi
Fit 5_2015_LiikuntakansiMirja Aarnio
 
Sistemas de comandos y cadenas de socorro
Sistemas de comandos y cadenas de socorroSistemas de comandos y cadenas de socorro
Sistemas de comandos y cadenas de socorroClaudia Blanco
 
Total Wellness Magazine: Dietary Supplements article design
Total Wellness Magazine: Dietary Supplements article designTotal Wellness Magazine: Dietary Supplements article design
Total Wellness Magazine: Dietary Supplements article designCatrina Pang
 
31st National Convention of Civil Engineers
31st National Convention of Civil Engineers31st National Convention of Civil Engineers
31st National Convention of Civil EngineersIEI GSC
 

Viewers also liked (9)

Media Rom-Com
Media  Rom-ComMedia  Rom-Com
Media Rom-Com
 
Degree certificate
Degree certificateDegree certificate
Degree certificate
 
Sunny Kumar CV
Sunny Kumar CVSunny Kumar CV
Sunny Kumar CV
 
Fit 5_2015_Liikuntakansi
Fit 5_2015_LiikuntakansiFit 5_2015_Liikuntakansi
Fit 5_2015_Liikuntakansi
 
Mqs
MqsMqs
Mqs
 
Sistemas de comandos y cadenas de socorro
Sistemas de comandos y cadenas de socorroSistemas de comandos y cadenas de socorro
Sistemas de comandos y cadenas de socorro
 
Total Wellness Magazine: Dietary Supplements article design
Total Wellness Magazine: Dietary Supplements article designTotal Wellness Magazine: Dietary Supplements article design
Total Wellness Magazine: Dietary Supplements article design
 
31st National Convention of Civil Engineers
31st National Convention of Civil Engineers31st National Convention of Civil Engineers
31st National Convention of Civil Engineers
 
Wilches 3
Wilches 3Wilches 3
Wilches 3
 

Similar to Case study 2 policy tech class-1

Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013Carlos Fernandez
 
Security
SecuritySecurity
SecurityNabatah
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy donekgrosvenor
 
List of possible policies for inter institution dialogue be
List of possible policies for inter institution dialogue beList of possible policies for inter institution dialogue be
List of possible policies for inter institution dialogue beJacob Adams
 
Interim ferpa-ppt-for-registrar-site-6-24-14-1
Interim ferpa-ppt-for-registrar-site-6-24-14-1Interim ferpa-ppt-for-registrar-site-6-24-14-1
Interim ferpa-ppt-for-registrar-site-6-24-14-1UConnPub
 
University Personal Devices (BYOD) Policy
University Personal Devices (BYOD) PolicyUniversity Personal Devices (BYOD) Policy
University Personal Devices (BYOD) Policykeyashaj
 
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'JISC RSC Eastern
 
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docxUNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docxdickonsondorris
 
Policy on ia 1st assignment
Policy on ia   1st assignmentPolicy on ia   1st assignment
Policy on ia 1st assignmentTimir Shah
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use PolicyBarb Jansen
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813jennifer_lawrence
 
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptxSocial Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptxJPAballe
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010Barb Jansen
 

Similar to Case study 2 policy tech class-1 (20)

Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
 
Security
SecuritySecurity
Security
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy done
 
List of possible policies for inter institution dialogue be
List of possible policies for inter institution dialogue beList of possible policies for inter institution dialogue be
List of possible policies for inter institution dialogue be
 
Interim ferpa-ppt-for-registrar-site-6-24-14-1
Interim ferpa-ppt-for-registrar-site-6-24-14-1Interim ferpa-ppt-for-registrar-site-6-24-14-1
Interim ferpa-ppt-for-registrar-site-6-24-14-1
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
University Personal Devices (BYOD) Policy
University Personal Devices (BYOD) PolicyUniversity Personal Devices (BYOD) Policy
University Personal Devices (BYOD) Policy
 
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
 
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docxUNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docx
 
Policy on ia 1st assignment
Policy on ia   1st assignmentPolicy on ia   1st assignment
Policy on ia 1st assignment
 
CES BYOT Agreement
CES BYOT AgreementCES BYOT Agreement
CES BYOT Agreement
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use Policy
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813
 
AUP Student Edition 2011
AUP Student Edition 2011AUP Student Edition 2011
AUP Student Edition 2011
 
Aup david.sayago
Aup david.sayagoAup david.sayago
Aup david.sayago
 
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptxSocial Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
Social media policy
Social media policySocial media policy
Social media policy
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

Case study 2 policy tech class-1

  • 1. Access to Student Information (Policy4455) KAGL University 2012-2013 Policy 4455: Access to Student Information At KAGL University, it is our mission to keep student information private while facilitating communication between students and organizations that may benefit them. In addition to adhering to all federal, state, and local laws governing information privacy, we plan to keep students safe by: 1. Allowing students to choose which organizations they receive information from. The students will have a two-week window at the beginning of each semester during which they may opt out of communications from groups they do not wish to be affiliated with. The only exception will be that students may not opt out of receiving communication from areas of the university that will directly affect their enrollment status or academic standing (i.e. - bursar, registrar, etc.) 2. Those wishing to be included on the list of possible organizations allowed to communicate with students via university technology systems must go through a screening process to ensure that they will not sell student information to third parties, engage in identity theft, fraud, or negatively impact students in any other way. 3. All computers used by the university will have anti-virus software to ensure the safety of current students. 4. Any computer used by the university will have their hard drive removed before being discarded to ensure that information of current/former students cannot be accessed in the future. Two informational technology technicians will be assigned to each computer being discarded or donated to ensure that they have been fully re-imaged before going off campus. 5. Individuals or Organizations wishing to receive donated computers from the university will go through a screening process similar to that of other organizations wishing to gain access to student information. Individuals or Organizations who do not adhere to this policy will be subject to disciplinary actions by the Informational Technology Review Board. These include but are not limited to: 1. For the first offense, disciplinary action may include a fine and probationary period during which the individuals will be monitored. If the breach of policy is illegal in nature or compromises the safety of the students, the organization will be reported directly to authorities and will be denied access to student information and communication. 2. For the second offense, termination of employment for university employees is possible. Organizations and individuals breaking this policy for the second time will instantly be excluded from electronic access to communication with students and will be taken off the computer donation list.