IT Policy at Mahalakshmi Tech Campus
Acceptable use policy involve the rules governing IT at Mahalakshmi Tech Campus encompasses the rules and regulation touching on the use of information technology resources and services. This policy is meant to provide protection, and proper use of IT assets in line with the aims of the campus, as an educational and working environment.
Acceptable Use
Purpose: IT resources are to be employed mainly for instructional and administrative activities.
Prohibited Activities: Crimes, fraud, and other infringements of law, and abuse of campus information technology are prohibited.
Security
Access Control: The access credentials must be safeguarded, and would not should be disclosed. Rights to obtain certain information are provided according to the job description and need to knowledge.
Data Protection: Information involving the individual and academic information must meet the privacy laws and regulations. Backup and update runs in order to maintain the security of the data.
Hardware and Software
Use and Maintenance: Prohibited uses of campus-provided hardware and software include using them responsibly and replacing parts as dictated by specified rules. Connect and adjust are prohibited unless by an authorized person.
Support: Getting technical help is possible with the help of IT support service where you can get all the necessary help. In case there is a problem with the application a user should seek help immediately.
Network Usage
Access: The campus network is intended for the use in education as well as administration. This policy also applies to attempts at gaining access to resources without proper authorization as well as network misuse such as using up congested bandwidths.
Monitoring: It established that students are able to have network activity that may be monitored for purposes of checking compliance to campus policies and security.
Email and Communication
Use: Any email address and communication application available from the campus must be treated like a workplace and desecrate professionalism.
Confidentiality: Confidentiality of information disclosed under the email must be observed and adhered to the general privacy policies.
Compliance and Enforcement
Adherence: This policy applies to all users of campus IT resources. Sanctions include use restrictions and legal penalties.
Review: The IT policy will be evaluated and modified as needed based on organizational change, Technology change and Requirement change.
Training and Support
Training: Training sessions will also be conducted time to time so that the users of IT may get aware of all the policies and procedures of it.
Support Services: There is technical help that can help out with any computer or other related problems and other questions concerning policies.