SlideShare a Scribd company logo
Access to Student Information (Policy4455)                             KAGL University 2012-2013


Policy 4455: Access to Student Information

At KAGL University, it is our mission to keep student information private while facilitating
communication between students and organizations that may benefit them. In addition to
adhering to all federal, state, and local laws governing information privacy, we plan to keep
students safe by:

   1. Allowing students to choose which organizations they receive information from. The
      students will have a two-week window at the beginning of each semester during which
      they may opt out of communications from groups they do not wish to be affiliated with.
      The only exception will be that students may not opt out of receiving communication
      from areas of the university that will directly affect their enrollment status or academic
      standing (i.e. - bursar, registrar, etc.)
   2. Those wishing to be included on the list of possible organizations allowed to
      communicate with students via university technology systems must go through a
      screening process to ensure that they will not sell student information to third parties,
      engage in identity theft, fraud, or negatively impact students in any other way.
   3. All computers used by the university will have anti-virus software to ensure the safety of
      current students.
   4. Any computer used by the university will have their hard drive removed before being
      discarded to ensure that information of current/former students cannot be accessed in the
      future. Two informational technology technicians will be assigned to each computer
      being discarded or donated to ensure that they have been fully re-imaged before going off
      campus.
   5. Individuals or Organizations wishing to receive donated computers from the university
      will go through a screening process similar to that of other organizations wishing to gain
      access to student information.

Individuals or Organizations who do not adhere to this policy will be subject to disciplinary
actions by the Informational Technology Review Board. These include but are not limited to:

   1. For the first offense, disciplinary action may include a fine and probationary period
      during which the individuals will be monitored. If the breach of policy is illegal in nature
      or compromises the safety of the students, the organization will be reported directly to
      authorities and will be denied access to student information and communication.
   2. For the second offense, termination of employment for university employees is possible.
      Organizations and individuals breaking this policy for the second time will instantly be
      excluded from electronic access to communication with students and will be taken off the
      computer donation list.

More Related Content

Viewers also liked

Media Rom-Com
Media  Rom-ComMedia  Rom-Com
Media Rom-Com
LewisPashley
 
Fit 5_2015_Liikuntakansi
Fit 5_2015_LiikuntakansiFit 5_2015_Liikuntakansi
Fit 5_2015_LiikuntakansiMirja Aarnio
 
Mqs
MqsMqs
Sistemas de comandos y cadenas de socorro
Sistemas de comandos y cadenas de socorroSistemas de comandos y cadenas de socorro
Sistemas de comandos y cadenas de socorro
Claudia Blanco
 
Total Wellness Magazine: Dietary Supplements article design
Total Wellness Magazine: Dietary Supplements article designTotal Wellness Magazine: Dietary Supplements article design
Total Wellness Magazine: Dietary Supplements article design
Catrina Pang
 
31st National Convention of Civil Engineers
31st National Convention of Civil Engineers31st National Convention of Civil Engineers
31st National Convention of Civil Engineers
IEI GSC
 

Viewers also liked (9)

Media Rom-Com
Media  Rom-ComMedia  Rom-Com
Media Rom-Com
 
Degree certificate
Degree certificateDegree certificate
Degree certificate
 
Sunny Kumar CV
Sunny Kumar CVSunny Kumar CV
Sunny Kumar CV
 
Fit 5_2015_Liikuntakansi
Fit 5_2015_LiikuntakansiFit 5_2015_Liikuntakansi
Fit 5_2015_Liikuntakansi
 
Mqs
MqsMqs
Mqs
 
Sistemas de comandos y cadenas de socorro
Sistemas de comandos y cadenas de socorroSistemas de comandos y cadenas de socorro
Sistemas de comandos y cadenas de socorro
 
Total Wellness Magazine: Dietary Supplements article design
Total Wellness Magazine: Dietary Supplements article designTotal Wellness Magazine: Dietary Supplements article design
Total Wellness Magazine: Dietary Supplements article design
 
31st National Convention of Civil Engineers
31st National Convention of Civil Engineers31st National Convention of Civil Engineers
31st National Convention of Civil Engineers
 
Wilches 3
Wilches 3Wilches 3
Wilches 3
 

Similar to Case study 2 policy tech class-1

Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013Carlos Fernandez
 
Security
SecuritySecurity
Security
Nabatah
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy donekgrosvenor
 
List of possible policies for inter institution dialogue be
List of possible policies for inter institution dialogue beList of possible policies for inter institution dialogue be
List of possible policies for inter institution dialogue beJacob Adams
 
Interim ferpa-ppt-for-registrar-site-6-24-14-1
Interim ferpa-ppt-for-registrar-site-6-24-14-1Interim ferpa-ppt-for-registrar-site-6-24-14-1
Interim ferpa-ppt-for-registrar-site-6-24-14-1UConnPub
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
bwcelearning
 
University Personal Devices (BYOD) Policy
University Personal Devices (BYOD) PolicyUniversity Personal Devices (BYOD) Policy
University Personal Devices (BYOD) Policy
keyashaj
 
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
JISC RSC Eastern
 
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docxUNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docx
dickonsondorris
 
Policy on ia 1st assignment
Policy on ia   1st assignmentPolicy on ia   1st assignment
Policy on ia 1st assignment
Timir Shah
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use PolicyBarb Jansen
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813jennifer_lawrence
 
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptxSocial Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
JPAballe
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Mi Ra Lavandelo
 
St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010Barb Jansen
 

Similar to Case study 2 policy tech class-1 (20)

Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
 
Security
SecuritySecurity
Security
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy done
 
List of possible policies for inter institution dialogue be
List of possible policies for inter institution dialogue beList of possible policies for inter institution dialogue be
List of possible policies for inter institution dialogue be
 
Interim ferpa-ppt-for-registrar-site-6-24-14-1
Interim ferpa-ppt-for-registrar-site-6-24-14-1Interim ferpa-ppt-for-registrar-site-6-24-14-1
Interim ferpa-ppt-for-registrar-site-6-24-14-1
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
University Personal Devices (BYOD) Policy
University Personal Devices (BYOD) PolicyUniversity Personal Devices (BYOD) Policy
University Personal Devices (BYOD) Policy
 
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
 
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docxUNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docx
 
Policy on ia 1st assignment
Policy on ia   1st assignmentPolicy on ia   1st assignment
Policy on ia 1st assignment
 
CES BYOT Agreement
CES BYOT AgreementCES BYOT Agreement
CES BYOT Agreement
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use Policy
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813
 
AUP Student Edition 2011
AUP Student Edition 2011AUP Student Edition 2011
AUP Student Edition 2011
 
Aup david.sayago
Aup david.sayagoAup david.sayago
Aup david.sayago
 
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptxSocial Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
Social media policy
Social media policySocial media policy
Social media policy
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010
 

Recently uploaded

A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

Case study 2 policy tech class-1

  • 1. Access to Student Information (Policy4455) KAGL University 2012-2013 Policy 4455: Access to Student Information At KAGL University, it is our mission to keep student information private while facilitating communication between students and organizations that may benefit them. In addition to adhering to all federal, state, and local laws governing information privacy, we plan to keep students safe by: 1. Allowing students to choose which organizations they receive information from. The students will have a two-week window at the beginning of each semester during which they may opt out of communications from groups they do not wish to be affiliated with. The only exception will be that students may not opt out of receiving communication from areas of the university that will directly affect their enrollment status or academic standing (i.e. - bursar, registrar, etc.) 2. Those wishing to be included on the list of possible organizations allowed to communicate with students via university technology systems must go through a screening process to ensure that they will not sell student information to third parties, engage in identity theft, fraud, or negatively impact students in any other way. 3. All computers used by the university will have anti-virus software to ensure the safety of current students. 4. Any computer used by the university will have their hard drive removed before being discarded to ensure that information of current/former students cannot be accessed in the future. Two informational technology technicians will be assigned to each computer being discarded or donated to ensure that they have been fully re-imaged before going off campus. 5. Individuals or Organizations wishing to receive donated computers from the university will go through a screening process similar to that of other organizations wishing to gain access to student information. Individuals or Organizations who do not adhere to this policy will be subject to disciplinary actions by the Informational Technology Review Board. These include but are not limited to: 1. For the first offense, disciplinary action may include a fine and probationary period during which the individuals will be monitored. If the breach of policy is illegal in nature or compromises the safety of the students, the organization will be reported directly to authorities and will be denied access to student information and communication. 2. For the second offense, termination of employment for university employees is possible. Organizations and individuals breaking this policy for the second time will instantly be excluded from electronic access to communication with students and will be taken off the computer donation list.