Abstract: Effective Date: 2/2/2016 |
|
Policy Statement
Jackson State University (JSU) grants its employees the privilege of purchasing smartphones and tablets of their choosing for work-related use. JSU reserves the right to revoke this privilege if users do not abide by the policies and procedures outlined below.
Purpose
This policy is intended to protect the security and integrity of JSU’s data and technology infrastructure. Limited exceptions to the policy may occur due to variations in devices and platforms.
Definitions
- Acceptable Use- is defined as use for activities that directly or indirectly support the business of JSU.
- Personal Use -is defined as a reasonable and limited amount of University time spent on personal communication for recreation, such as reading or playing a game.
Employee Adherence
JSU employees must agree to the terms and conditions set forth in this policy in order to be able to connect their devices to the JSU network.
Policy
Acceptable Use
- Employees are blocked from accessing certain websites during work hours while connected to the University network.
- Employees may use their mobile device to access the following University-owned resources: email, calendars, contacts, documents, etc.
- Devices’ camera and/or video capabilities are not disabled while on-site.
- Limited amount of personal apps and game apps usage are permitted during work hours.
- Devices may not be used at any time to:
- Store or transmit illicit materials
- Store or transmit proprietary information belonging to another university
- Harass others
- Engage in outside business activities
Policy Compliance
- An employee found in violation of this policy may be subject to disciplinary action and network access be revoked for a limited amount of time until security training is verified by JSU’s Division of Information Technology (DIT) department.
- An employee found in repeat violation of this policy may be permanently revoked from JSU network access.
Related Standards, Policies, and Processes
- Mobile Device Security Policy
- Acceptable Use Email Policy
- Data Classification Standards
- Data Security Policy
- Data Security Definitions
- Acceptable Use