Policy 7:10 - User Account Creation and Management (2024)

Policy Contact: Division of Technology and Security

  1. Purpose

    This policy provides protocols regarding the creation and management of user accounts for use on Information Technology Systems, as defined in SDBOR Policy 7.1, operated within the University.

  2. Policy
    1. User Account Creation
      1. Individuals will be provided a user account upon determination by the Division of Technology and Security that the individual is a qualified account user pursuant to SDBOR and University policies and procedures.
      2. Faculty and staff accounts will be made available upon completion of the necessary Human Resources documents or following submission of an Early Network Account Request Form to the Division of Technology and Security.
      3. Unique logins will be generated by the Division of Technology and Security staff in accordance with University determined protocols.
      4. The Division of Technology and Security will provide individual users with information regarding appropriate password designation and use.
      5. Role accounts may be approved by the Division of Technology and Security in accordance with the protocols established by that office. If the Division of Technology and Security finds there is no better solution given the circ*mstances, generic accounts may be approved by that office and be created as email only accounts.
        1. Requests for generic accounts are made by submitting the Generic Email Account Request Form, with approval from the Vice President for Technology & Security, successor, or designee.
    2. Security of Login Credentials and Passwords
      1. Releasing login credentials and passwords compromises an individual’s account and SDBOR and University Information Technology Systems.
      2. Under no circ*mstances shall an account holder share or disclose their login credentials and password to anyone else, including but not limited to third parties, other departmental staff, faculty, or students.
      3. No individual, including Division of Technology and Security staff, will ask another individual to share or disclose their login credentials and password.
    3. Account Information Security
      1. Account holders with access to student information or protected health information will make themselves aware of, and comply with, all state and federal laws regarding student information (e.g., FERPA and HIPAA).
      2. No user has any expectation of privacy in any message, file, image, or data created, sent, retrieved, or received by use of the SDBOR or University’s equipment and/or access. The SDBOR and University have the right to monitor any and all aspects of SDBOR and University owned computer systems and to do so at any time, without notice, and without the user's permission. This policy applies to all employees, faculty, students, affiliates and visitors at the University.
    4. Investigations of Electronic Communications
      1. Use of SDBOR and University Information Technology and Computer Resources are subject to SDBOR and University policies, including but not limited to Acceptable Use policies. "Electronic communications" includes telephone communications, Internet usage, phone messages, e-mail, and computer files traversing the SDBOR and University’s networks or stored on SDBOR and University equipment. Examples of when monitoring and/or review may occur include, but are not limited to, the following circ*mstances:
        1. Communications or files targeted by orders of a court of law or requested in accord with the Federal Freedom of Information Act.
        2. Electronic communications or files that have been inadvertently exposed to technical staff that are operating in good faith to resolve technical problems.
        3. When technical staff inadvertently see or hear potentially illegal content in communications or files, they are required to report what they have seen or heard to appropriate authorities. If no potentially illegal content is present, the University expects technical staff to treat inadvertently encountered electronic communications and files of University employees as confidential and not subject to disclosure to anyone.
        4. Routine administrative functions, such as security tests of computing systems, including password testing by system administrators to identify guessable passwords and investigations of attempted access into systems by unauthorized persons (system administrators and other technical staff will not access employees' electronic communications or files while performing these functions).
        5. Situations, such as the following two examples, will be specifically reviewed by and approved by the Vice President for Technology & Security and the A.V.P., their successors, or designees:
          1. An investigation into allegations of violations of law or policy affecting employment.
          2. An urgent need for access to college business documents when an employee is unavailable.
        6. More specialized services offered by the Division of Technology and Security, such as the administrative database and the Library catalog, may have their own more specific policies regarding issuance, use, privacy and expiration of accounts which should take precedence over these more general policies.
  3. Procedures
    1. If an individual receives a request for release of their login credentials and password they should not release this information and should contact the University Support Desk to report the incident.
    2. If an individual receives an email message claiming to be from the Division of Technology and Security asking for their login credentials and password or any other confidential information, the individual should not respond to the message. The individual should notify the University Support Desk.
    3. Any account that has been compromised by release of login credentials and password to a third party must be immediately locked without warning. The Division of Technology and Security designated staff will lock the account. To re-enable the account, the user must contact the University Support Desk for assistance.
  4. Responsible Administrator

    The Vice President for Technology & Security, or designee, is responsible for the annual and ad hoc review of this policy. The University President is responsible for formal policy approval.

Approved by President 09/28/2017. Revised 01/31/2024 (clerical).

Sources: SDBOR Policy 7.1 and 7.4

Associated Forms:Early Network Account Request Form, Generic Email Request Account Form

Policy 7:10 - User Account Creation and Management (2024)
Top Articles
Samsung Galaxy S20 FE 5G: Prices, 1 Colors, Sizes, Features & Specs
WEDNESDAY UPDATES: At its peak, 220,000 lost power in Omaha-metro; winds hit 90mph
St Thomas Usvi Craigslist
Hotels
The UPS Store | Ship & Print Here > 400 West Broadway
Le Blanc Los Cabos - Los Cabos – Le Blanc Spa Resort Adults-Only All Inclusive
Nc Maxpreps
Alpha Kenny Buddy - Songs, Events and Music Stats | Viberate.com
Soap2Day Autoplay
Heska Ulite
All Obituaries | Ashley's J H Williams & Sons, Inc. | Selma AL funeral home and cremation
How Many Cc's Is A 96 Cubic Inch Engine
Sports Clips Plant City
Lesson 8 Skills Practice Solve Two-Step Inequalities Answer Key
Tnt Forum Activeboard
Rams vs. Lions highlights: Detroit defeats Los Angeles 26-20 in overtime thriller
Lakewood Campground Golf Cart Rental
Amazing Lash Studio Casa Linda
Обзор Joxi: Что это такое? Отзывы, аналоги, сайт и инструкции | APS
Skycurve Replacement Mat
10 Best Places to Go and Things to Know for a Trip to the Hickory M...
Joann Fabrics Lexington Sc
Www Mydocbill Rada
Gncc Live Timing And Scoring
A Plus Nails Stewartville Mn
Gridwords Factoring 1 Answers Pdf
After Transmigrating, The Fat Wife Made A Comeback! Chapter 2209 – Chapter 2209: Love at First Sight - Novel Cool
Fandango Pocatello
Poster & 1600 Autocollants créatifs | Activité facile et ludique | Poppik Stickers
Sitting Human Silhouette Demonologist
Consume Oakbrook Terrace Menu
Baywatch 2017 123Movies
Planet Fitness Lebanon Nh
Myql Loan Login
20 bank M&A deals with the largest target asset volume in 2023
Immobiliare di Felice| Appartamento | Appartamento in vendita Porto San
Busted Newspaper Mcpherson Kansas
Woody Folsom Overflow Inventory
Academic Notice and Subject to Dismissal
Brown launches digital hub to expand community, career exploration for students, alumni
Marcal Paper Products - Nassau Paper Company Ltd. -
Nearest Wintrust Bank
3367164101
Automatic Vehicle Accident Detection and Messageing System – IJERT
Causeway Gomovies
Www Ventusky
Mkvcinemas Movies Free Download
Optimal Perks Rs3
Grace Charis Shagmag
Lsreg Att
Syrie Funeral Home Obituary
Honeybee: Classification, Morphology, Types, and Lifecycle
Latest Posts
Article information

Author: Kimberely Baumbach CPA

Last Updated:

Views: 5944

Rating: 4 / 5 (61 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Kimberely Baumbach CPA

Birthday: 1996-01-14

Address: 8381 Boyce Course, Imeldachester, ND 74681

Phone: +3571286597580

Job: Product Banking Analyst

Hobby: Cosplaying, Inline skating, Amateur radio, Baton twirling, Mountaineering, Flying, Archery

Introduction: My name is Kimberely Baumbach CPA, I am a gorgeous, bright, charming, encouraging, zealous, lively, good person who loves writing and wants to share my knowledge and understanding with you.