Disciplinary Action Standard
Date of Current Revision or Creation:ÌýNovember 1, 2021
The purpose of an Information Technology Standard is to specify requirements for compliance with Old à£à£Ö±²¥Ðã University Information Technology policies, other University policies, as well as applicable laws and regulations. Standards may include business principles, best practices, technical standards, migration and implementation strategies, that direct the design, deployment and management of information technology.
Purpose
The purpose of this compliance standard is to establish general rules for how violations of information technology security policy and standards are handled.
Definitions
Information Technology Resources are defined as computers, telecommunication equipment, networks, automated data processing, databases, the Internet, printing, management information systems, and related information, equipment, goods, and services.
Data Users/Users - Individuals and organizations that access Institutional Data and Information in order to perform their assigned duties or to fulfill their role in the University community.
Standards Statement
Disciplinary Action
An information technology security violation is a serious offense that may result in the withdrawal of access and may subject the user to disciplinary action or academic sanctions consistent with University policies and procedures.
Disciplinary actions or academic sanctions will be assessed in accordance with the following:
- Violations of IT security policy by a faculty member will be the basis for disciplinary action in accordance with the policy on Faculty Sanctions.
- Violations of IT security policy by a faculty administrator will be the basis for disciplinary action in accordance with the Board of Visitors Policy on Administrative and Professional Faculty.
- Violations of IT security policy by a staff member will be the basis for disciplinary action in accordance with
- Violations of IT security policy by a student will be the basis for disciplinary action in accordance with BOV Policy 1530 Code of Student Conduct.
Old à£à£Ö±²¥Ðã University reserves the right to revoke any user's access privileges at any time for violations of policy, standards and/or conduct that disrupts the normal operation of information technology resources. Authority may be exercised without notice.
Procedures, Guidelines & Other Related Information
- Federal and State Law
- BOV Policy 1450 Faculty Sanctions
- BOV Policy 1490 on Administrative and Professional Faculty
- BOV Policy 1530 Code of Student Conduct
- University Policy 3505 Security Policy
History
Date |
Responsible Party |
Action |
October 2009 |
ITAC/CIO |
Reaffirmed |
October 2010 |
ITAC/CIO |
Reaffirmed |
October 2011 |
ITAC/CIO |
Reaffirmed |
October 2012 |
ITAC/CIO |
Reaffirmed |
January 31 2013 |
IT Policy Office |
Related information updated. Numbering revision |
August 2015 | IT Policy Office/ISO | Updated links, definitions. Three year review, reaffirmed. |
August 2018 | IT Policy Office/ISO | Updated links, definitions. Three year review, reaffirmed. |
November 2021 | IT Policy Office/ISO | Updated links. Three-year review, reaffirmed. |