Information Technology Policies & Procedures
Employee Use of Personal Device for Work Purposes
Policy: IT_Employee Use of Personal Device for Work Purposes. In response to the increasing use of personally owned computing devices (POCD) by employees for TCU business purposes, TCU has established an official policy. The purpose of this policy is to define the appropriate use and procedures for using personally owned computing devices on a TCU Network.
Technology Acquisitions
Policy: IT - Technology Acquisitions. This policy applies to all TCU departments. The intent of the policy is to ensure that technology and technology services comply with established Information Technology and University support standards, as well as mandated security safeguards.
Data Classification
Policy: IT - Data Classification. The University provides access to its administrative and academic data in order to facilitate the business of the University. This access, however, must be accomplished in a manner that ensures the security, confidentiality, integrity and availability of the data. All users share in this responsibility. To help facilitate this purpose, this policy describes several classifications or categories of data and then goes on to describe how each may be used and protected.
Network Access
Policy: IT - Network Access. This policy establishes acceptable usage for TCU Information Technology network resources. These rules and guidelines are in place to protect the integrity of the wired and wireless networks that users access to accomplish their work and study needs.
Network and Computer Usage
Policy: IT - Network and Computer Usage. TCU provides technology to help facilitate the academic, research, and administrative needs of students, faculty and staff. Technology allows you to quickly and efficiently access and exchange information, both within the TCU community and around the globe. This valuable resource is provided as a privilege, and with that privilege comes the responsibility of all users to conduct themselves in a manner consistent with the mission, purposes and values of the University. It is the responsibility of every person who uses University Computing Resources to read and abide by this Network and Computer Usage Policy.