SlideShare a Scribd company logo
1 of 8
Download to read offline
California State University, Fresno Association Inc.

Software/Hardware Policy
Introduction
The presence of a standard policy regarding the use of software and hardware will: (a)
enhance the uniform performance of the Management Information Services Department
(MIS) in delivering, implementing, and maintaining software and hardware suitable to
the business needs of the California State University, Fresno Association, Inc.
(“Association”), as well as other auxiliary organizations to which MIS provides service,
and (b) define the duties and responsibilities of Association employees (and employees of
other auxiliaries with whom the Association provides services) who use the
aforementioned software and hardware in the performance of their job duties.

Acceptable use
This section defines what constitutes “acceptable use” of the company’s electronic
resources, including software, hardware devices, and network systems. Hardware
devices, software programs, and network systems purchased and provided by the
company are to be used only for creating, researching, and processing company-related
materials, and other tasks necessary for discharging one’s employment duties. By using
the company’s hardware, software, and network systems you assume personal
responsibility for their appropriate use and agree to comply with this policy and other
applicable company policies, as well as city, state, and federal laws and regulations.

Violations
Violations may result in disciplinary action in accordance with company policy. Failure
to observe these guidelines may result in disciplinary action by the company depending
upon the type and severity of the violation, whether it causes any liability or loss to the
company, and/or the presence of any repeated violation(s).
Administration
The MIS director is responsible for the administration of this policy. This policy is a
living document and may be modified at any time by the MIS Director or the Association
Executive Director.

Contents
The topics covered in this document include:
•
Software Purchasing
•
Software Licensing
•
Software Standards
•
Software Installation
•
Hardware Purchasing
•
Hardware Standards

Software
All software acquired for or on behalf of the company or developed by company
employees or contract personnel on behalf of the company is and at all times shall remain
company property. All such software must be used in compliance with applicable
licenses, notices, contracts, and agreements.

Purchasing
All purchasing of company software shall be centralized within the MIS department to
ensure that all applications conform to corporate software standards and are purchased at
the best possible price. All requests for corporate software must be submitted to the
department Director for his/her approval. The request must then be sent to the MIS
department, which will then review the need for such software, and then determine the
standard software that best accommodates the desired request if MIS determines that such
software is needed.

Licensing
Each employee is individually responsible for reading, understanding, and following all
applicable licenses, notices, contracts, and agreements for software that he or she uses or
seeks to use on company computers. If an employee needs help in interpreting the
meaning/application of any such licenses, notices, contracts and agreements, he/she will
contact MIS for assistance. Unless otherwise provided in the applicable license, notice,
contract, or agreement, any duplication of copyrighted software, except for backup and
archival purposes, may be a violation of federal and state law. In addition to violating
such laws, unauthorized duplication of software is a violation of the company’s
Software/Hardware Policy.

H:Brent DocumentsWeb-SiteWeb Site AdditionsMISSoftware_Hardware_Policy.doc
Last updated 2/16/2007, 8:59 AM

2
Software standards
The following list shows the standard suite of software installed on company computers
(excluding test computers) that is fully supported by the information technology
department:
•
Microsoft Windows 2000 / Microsoft Windows XP
•
Microsoft Outlook
•
Microsoft Office (Word, Excel, PowerPoint, Access, Photo Editor)
•
Microsoft Internet Explorer
•
Microsoft AntiSpyware
•
Trend Micro Officescan
•
Meeting Maker
•
IBM Client Access
•
Adobe Acrobat Reader
•
WinZip
•
Media Player, Real Player, Quicktime
•
CD Writing Software
Where applicable the following software will be installed on company computers
•
•
•
•
•
•
•
•
•
•
•

Microsoft Visio
Microsoft Project
Kronos
File Maker Pro
Microsoft Publisher
Print Shop
Front Page
Dreamweaver
Pagemaker
EMS Pro
Odyssey – HMS and PCS

Employees needing software other than those programs listed above must request such
software from the MIS department. Each request will be considered on a case-by-case
basis in conjunction with the software-purchasing section of this policy.

Software Installation
The MIS department is exclusively responsible for installing and supporting all software
on company computers. These responsibilities extend to:
•
Office desktop computers
•
Company laptop computers
•
Computer lab desktop computers
•
PDA devices
•
Telecommuter home computers that are provided by the company
The MIS department relies on installation and support to provide software and hardware
in good operating condition to the employees so that they can best accomplish their tasks.
H:Brent DocumentsWeb-SiteWeb Site AdditionsMISSoftware_Hardware_Policy.doc
Last updated 2/16/2007, 8:59 AM

3
Hardware
All hardware devices acquired by the Association or developed by it (through its own
employees or through those hired by the Association to develop the hardware devices) is
and at all times shall remain company property. All such hardware devices must be used
in compliance with applicable licenses, notices, contracts, and agreements.

Purchasing
All purchasing of company computer hardware devices shall be centralized within the
MIS department to ensure that all equipment conforms to corporate hardware standards
and is purchased or leased at the best possible price.
All requests for corporate computing hardware devices must be in the annual corporate
budget document and have the department Directors approval. The request must then be
sent to the MIS department, who will then review the need for such hardware, and then
determine standard hardware that best accommodates the desired request, if MIS
determines that such hardware is needed.

Hardware standards
The following list shows thetypical hardware configuration for new company computers:
•

Desktops - provided to employees who work primarily from the office.
-

Pentium IV, 2.8 GHz, 2 MB cache Intel Processor

-

512-MB RAM

-

Windows XP Professional

-

Integrated Video

-

1.44M 3 ½” floppy drive (A:)

-

40-GB hard drive (C:)

-

24X CDRW/DVD (E:)

-

Integrated 10/100/1000 Ethernet

-

Integrated Audio

-

Speakers

-

USB Enhanced Multimedia Keyboard

-

USB Optical Mouse with Scroll

-

All applicable cables

-

Surge protector

-

3 year warranty / 3 year on site service

H:Brent DocumentsWeb-SiteWeb Site AdditionsMISSoftware_Hardware_Policy.doc
Last updated 2/16/2007, 8:59 AM

4
•

Laptops - provided to employees required to frequently work away from the
office.
-

1 GB RAM

-

32 MB Video Adapter

-

1.44M 3 ½” floppy drive (A:)

-

40-GB IDE hard drive (C:)

-

24X Combo DVD/CDRW (E:)

-

Integrated 10/100 Ethernet

-

Integrated Wireless

-

Integrated 56K modem

-

2 USB port

-

Integrated Audio

-

Docking station / Port Replicator

-

Speakers

-

USB Enhanced Multimedia KeyboardUSB Optical Mouse with ScrollAll
applicable cables

-

Surge protector

-

Carrying case

-

Extra power adapter and mouse

•

Pentium M Processor, 1.8 GHz

3 year warranty / 3 year on site service

Monitors
-

•

Monitors will be provided for both desktop and laptop systems.
Minimum 17” viewing area, 1024 x 768

Printers
-

Employees will be given access to appropriate network printers. In some
limited cases, employees may be given local printers if deemed necessary by
the department director in consultation with the MIS department.

Employees needing computer hardware other than what is stated above must request such
hardware from the MIS department. Each request will be considered on a case-by-case
basis in conjunction with the hardware-purchasing section of this policy.

H:Brent DocumentsWeb-SiteWeb Site AdditionsMISSoftware_Hardware_Policy.doc
Last updated 2/16/2007, 8:59 AM

5
Outside equipment
No outside equipment may be plugged into the company’s network without the MIS
department’s written permission.

Summary
This policy is designed to facilitate California State University, Fresno Association, Inc.
employees in maximizing the efficient performance of their job duties. Any deviation
from this strategy will require the MIS department to redeploy software and/or hardware
solutions. Full cooperation with this policy is mandatory so that all goals can be met in
accordance with the Association’s business objectives.

H:Brent DocumentsWeb-SiteWeb Site AdditionsMISSoftware_Hardware_Policy.doc
Last updated 2/16/2007, 8:59 AM

6
Acknowledgment of Software/Hardware Policy
This form is used to acknowledge receipt of and pledge
compliance with the Association’s Software/Hardware Policy.

Procedure
Complete the following steps:
1.

Read the Software/Hardware Policy.

2.

Initial the spaces provided below, Sign and date the last page.

3.

Return to the Management Information Services Director.

Initial
By initialing below, I agree to the following terms:
(i)
I have received and read a copy of the Software/Hardware Policy and
understand and agree to abide by the same.
(ii)
I understand and agree that any software and hardware devices provided to
me by the company remain the property of the company.
(iii)
I understand and agree that I am not to modify, alter, or upgrade any
software programs or hardware devices provided to me by the organization
without the permission of the MIS Department.
(iv)
I understand and agree that I shall not copy, duplicate (except for backup
purposes as part of my job), or allow anyone else to copy or duplicate any
software.
(v)
I agree that if I leave the employment of the California State University,
Fresno Association, Inc. for any reason, I shall immediately return to the company
the original and copies of any and all software, computer materials, or computer
equipment that I may have received from the Association that is either in my
possession or otherwise directly or indirectly under my control.

H:Brent DocumentsWeb-SiteWeb Site AdditionsMISSoftware_Hardware_Policy.doc
Last updated 2/16/2007, 8:59 AM

7
(vi)
I understand and agree I must make reasonable efforts to protect all
Association-provided software and hardware devices from theft and physical
damage.

______________________________________
Employee Signature

______________________________________
Employee Name

______________________________________
Employee Title

______________________________________
Date

______________________________________
Department/Location

H:Brent DocumentsWeb-SiteWeb Site AdditionsMISSoftware_Hardware_Policy.doc
Last updated 2/16/2007, 8:59 AM

8

More Related Content

Similar to Software hardware policy

Software License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera SoftwareSoftware License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera SoftwareFlexera
 
Adaptor Configuration and Development Service
Adaptor Configuration and Development ServiceAdaptor Configuration and Development Service
Adaptor Configuration and Development ServiceFlexera
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesSharing Slides Training
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development Strategiessharing notes123
 
Cybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationCybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationFlexera
 
FlexNet Manager Platform Datasheet
FlexNet Manager Platform DatasheetFlexNet Manager Platform Datasheet
FlexNet Manager Platform DatasheetFlexera
 
Software License Optimization Managed Services
Software License Optimization Managed ServicesSoftware License Optimization Managed Services
Software License Optimization Managed ServicesFlexera
 
Frontline Company Profile
Frontline Company ProfileFrontline Company Profile
Frontline Company ProfileAchyut Patil
 
License Position Snapshot Service
License Position Snapshot ServiceLicense Position Snapshot Service
License Position Snapshot ServiceFlexera
 

Similar to Software hardware policy (20)

Jon shende fbcs citp q&a
Jon shende fbcs citp q&aJon shende fbcs citp q&a
Jon shende fbcs citp q&a
 
Software License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera SoftwareSoftware License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera Software
 
Adaptor Configuration and Development Service
Adaptor Configuration and Development ServiceAdaptor Configuration and Development Service
Adaptor Configuration and Development Service
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development Strategies
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development Strategies
 
Cybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationCybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License Optimization
 
FlexNet Manager Platform Datasheet
FlexNet Manager Platform DatasheetFlexNet Manager Platform Datasheet
FlexNet Manager Platform Datasheet
 
Software License Optimization Managed Services
Software License Optimization Managed ServicesSoftware License Optimization Managed Services
Software License Optimization Managed Services
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
IBS Assessment 1
IBS Assessment 1IBS Assessment 1
IBS Assessment 1
 
Frontline Company Profile
Frontline Company ProfileFrontline Company Profile
Frontline Company Profile
 
License Position Snapshot Service
License Position Snapshot ServiceLicense Position Snapshot Service
License Position Snapshot Service
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 

Recently uploaded

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 

Recently uploaded (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Software hardware policy

  • 1. California State University, Fresno Association Inc. Software/Hardware Policy Introduction The presence of a standard policy regarding the use of software and hardware will: (a) enhance the uniform performance of the Management Information Services Department (MIS) in delivering, implementing, and maintaining software and hardware suitable to the business needs of the California State University, Fresno Association, Inc. (“Association”), as well as other auxiliary organizations to which MIS provides service, and (b) define the duties and responsibilities of Association employees (and employees of other auxiliaries with whom the Association provides services) who use the aforementioned software and hardware in the performance of their job duties. Acceptable use This section defines what constitutes “acceptable use” of the company’s electronic resources, including software, hardware devices, and network systems. Hardware devices, software programs, and network systems purchased and provided by the company are to be used only for creating, researching, and processing company-related materials, and other tasks necessary for discharging one’s employment duties. By using the company’s hardware, software, and network systems you assume personal responsibility for their appropriate use and agree to comply with this policy and other applicable company policies, as well as city, state, and federal laws and regulations. Violations Violations may result in disciplinary action in accordance with company policy. Failure to observe these guidelines may result in disciplinary action by the company depending upon the type and severity of the violation, whether it causes any liability or loss to the company, and/or the presence of any repeated violation(s).
  • 2. Administration The MIS director is responsible for the administration of this policy. This policy is a living document and may be modified at any time by the MIS Director or the Association Executive Director. Contents The topics covered in this document include: • Software Purchasing • Software Licensing • Software Standards • Software Installation • Hardware Purchasing • Hardware Standards Software All software acquired for or on behalf of the company or developed by company employees or contract personnel on behalf of the company is and at all times shall remain company property. All such software must be used in compliance with applicable licenses, notices, contracts, and agreements. Purchasing All purchasing of company software shall be centralized within the MIS department to ensure that all applications conform to corporate software standards and are purchased at the best possible price. All requests for corporate software must be submitted to the department Director for his/her approval. The request must then be sent to the MIS department, which will then review the need for such software, and then determine the standard software that best accommodates the desired request if MIS determines that such software is needed. Licensing Each employee is individually responsible for reading, understanding, and following all applicable licenses, notices, contracts, and agreements for software that he or she uses or seeks to use on company computers. If an employee needs help in interpreting the meaning/application of any such licenses, notices, contracts and agreements, he/she will contact MIS for assistance. Unless otherwise provided in the applicable license, notice, contract, or agreement, any duplication of copyrighted software, except for backup and archival purposes, may be a violation of federal and state law. In addition to violating such laws, unauthorized duplication of software is a violation of the company’s Software/Hardware Policy. H:Brent DocumentsWeb-SiteWeb Site AdditionsMISSoftware_Hardware_Policy.doc Last updated 2/16/2007, 8:59 AM 2
  • 3. Software standards The following list shows the standard suite of software installed on company computers (excluding test computers) that is fully supported by the information technology department: • Microsoft Windows 2000 / Microsoft Windows XP • Microsoft Outlook • Microsoft Office (Word, Excel, PowerPoint, Access, Photo Editor) • Microsoft Internet Explorer • Microsoft AntiSpyware • Trend Micro Officescan • Meeting Maker • IBM Client Access • Adobe Acrobat Reader • WinZip • Media Player, Real Player, Quicktime • CD Writing Software Where applicable the following software will be installed on company computers • • • • • • • • • • • Microsoft Visio Microsoft Project Kronos File Maker Pro Microsoft Publisher Print Shop Front Page Dreamweaver Pagemaker EMS Pro Odyssey – HMS and PCS Employees needing software other than those programs listed above must request such software from the MIS department. Each request will be considered on a case-by-case basis in conjunction with the software-purchasing section of this policy. Software Installation The MIS department is exclusively responsible for installing and supporting all software on company computers. These responsibilities extend to: • Office desktop computers • Company laptop computers • Computer lab desktop computers • PDA devices • Telecommuter home computers that are provided by the company The MIS department relies on installation and support to provide software and hardware in good operating condition to the employees so that they can best accomplish their tasks. H:Brent DocumentsWeb-SiteWeb Site AdditionsMISSoftware_Hardware_Policy.doc Last updated 2/16/2007, 8:59 AM 3
  • 4. Hardware All hardware devices acquired by the Association or developed by it (through its own employees or through those hired by the Association to develop the hardware devices) is and at all times shall remain company property. All such hardware devices must be used in compliance with applicable licenses, notices, contracts, and agreements. Purchasing All purchasing of company computer hardware devices shall be centralized within the MIS department to ensure that all equipment conforms to corporate hardware standards and is purchased or leased at the best possible price. All requests for corporate computing hardware devices must be in the annual corporate budget document and have the department Directors approval. The request must then be sent to the MIS department, who will then review the need for such hardware, and then determine standard hardware that best accommodates the desired request, if MIS determines that such hardware is needed. Hardware standards The following list shows thetypical hardware configuration for new company computers: • Desktops - provided to employees who work primarily from the office. - Pentium IV, 2.8 GHz, 2 MB cache Intel Processor - 512-MB RAM - Windows XP Professional - Integrated Video - 1.44M 3 ½” floppy drive (A:) - 40-GB hard drive (C:) - 24X CDRW/DVD (E:) - Integrated 10/100/1000 Ethernet - Integrated Audio - Speakers - USB Enhanced Multimedia Keyboard - USB Optical Mouse with Scroll - All applicable cables - Surge protector - 3 year warranty / 3 year on site service H:Brent DocumentsWeb-SiteWeb Site AdditionsMISSoftware_Hardware_Policy.doc Last updated 2/16/2007, 8:59 AM 4
  • 5. • Laptops - provided to employees required to frequently work away from the office. - 1 GB RAM - 32 MB Video Adapter - 1.44M 3 ½” floppy drive (A:) - 40-GB IDE hard drive (C:) - 24X Combo DVD/CDRW (E:) - Integrated 10/100 Ethernet - Integrated Wireless - Integrated 56K modem - 2 USB port - Integrated Audio - Docking station / Port Replicator - Speakers - USB Enhanced Multimedia KeyboardUSB Optical Mouse with ScrollAll applicable cables - Surge protector - Carrying case - Extra power adapter and mouse • Pentium M Processor, 1.8 GHz 3 year warranty / 3 year on site service Monitors - • Monitors will be provided for both desktop and laptop systems. Minimum 17” viewing area, 1024 x 768 Printers - Employees will be given access to appropriate network printers. In some limited cases, employees may be given local printers if deemed necessary by the department director in consultation with the MIS department. Employees needing computer hardware other than what is stated above must request such hardware from the MIS department. Each request will be considered on a case-by-case basis in conjunction with the hardware-purchasing section of this policy. H:Brent DocumentsWeb-SiteWeb Site AdditionsMISSoftware_Hardware_Policy.doc Last updated 2/16/2007, 8:59 AM 5
  • 6. Outside equipment No outside equipment may be plugged into the company’s network without the MIS department’s written permission. Summary This policy is designed to facilitate California State University, Fresno Association, Inc. employees in maximizing the efficient performance of their job duties. Any deviation from this strategy will require the MIS department to redeploy software and/or hardware solutions. Full cooperation with this policy is mandatory so that all goals can be met in accordance with the Association’s business objectives. H:Brent DocumentsWeb-SiteWeb Site AdditionsMISSoftware_Hardware_Policy.doc Last updated 2/16/2007, 8:59 AM 6
  • 7. Acknowledgment of Software/Hardware Policy This form is used to acknowledge receipt of and pledge compliance with the Association’s Software/Hardware Policy. Procedure Complete the following steps: 1. Read the Software/Hardware Policy. 2. Initial the spaces provided below, Sign and date the last page. 3. Return to the Management Information Services Director. Initial By initialing below, I agree to the following terms: (i) I have received and read a copy of the Software/Hardware Policy and understand and agree to abide by the same. (ii) I understand and agree that any software and hardware devices provided to me by the company remain the property of the company. (iii) I understand and agree that I am not to modify, alter, or upgrade any software programs or hardware devices provided to me by the organization without the permission of the MIS Department. (iv) I understand and agree that I shall not copy, duplicate (except for backup purposes as part of my job), or allow anyone else to copy or duplicate any software. (v) I agree that if I leave the employment of the California State University, Fresno Association, Inc. for any reason, I shall immediately return to the company the original and copies of any and all software, computer materials, or computer equipment that I may have received from the Association that is either in my possession or otherwise directly or indirectly under my control. H:Brent DocumentsWeb-SiteWeb Site AdditionsMISSoftware_Hardware_Policy.doc Last updated 2/16/2007, 8:59 AM 7
  • 8. (vi) I understand and agree I must make reasonable efforts to protect all Association-provided software and hardware devices from theft and physical damage. ______________________________________ Employee Signature ______________________________________ Employee Name ______________________________________ Employee Title ______________________________________ Date ______________________________________ Department/Location H:Brent DocumentsWeb-SiteWeb Site AdditionsMISSoftware_Hardware_Policy.doc Last updated 2/16/2007, 8:59 AM 8