IT Services RSS Feed

Text Messaging
3D Printing and Additive Manufacturing
This policy identifies the terms and conditions under which all 3D printers owned, leased, or operated by the University, or that are otherwise located on the University’s premises, and all persons that may use such 3D printers.
Computer Peripherals and Software Acquisition
This policy governs the acquisition of software and computer peripherals
Responsible Use of University Computing Resources
This policy requires the responsible use of University computing resources. University Computing Resources include, but are not limited to, end-user computing devices, servers, networks, email, software, printers, scanners, video distribution systems, telephone systems, and other computing hardware and software, whether owned by the University or contracted from a third party.
Illegal or Unauthorized Use of University Computing Resources
This policy governs the illegal or unauthorized use of University computing resources.
Unauthorized Peer to Peer File Sharing
This policy governs authorized and unauthorized use of peer-to-peer file sharing.
This policy governs the use of cellphones and photographic imaging devices in University activities.
Email Policy
This policy governs the use of the University email system.
Accessible Technology
This policy requires equal opportunity for qualified individuals with disabilities including services, programs, and activities that are delivered through web-based, digital, and emerging technologies.