Vanderbilt University Electronic Communications and Information Technology Policy

302 KB | 3 files | null PDF,null DOC

This broad-sweeping policy covers staff members' responsibilities for security the organization's equipment and data, as well as the organization's ownership and rights to electronic communications and other information.

Vanderbilt University's policy provides guidance for the appropriate use of information technology resources by Vanderbilt staff members to ensure that these systems are used in an appropriate, productive and lawful manner in accordance with all other Vanderbilt policies.

Information technology resources are provided to staff members for assistance with performing job responsibilities. Additionally, in some circumstances, this policy applies to communications and/or equipment not owned by Vanderbilt.

The policy includes staff member responsibilities regarding security of information, guidelines for communications outside of one's area of responsibility and the University's rights with respect to electronic communications transmitted via University systems.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Vanderbilt University Electronic Communications and Information Technology Resources Policy.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

Vanderbilt University, located in Nashville, Tenn., is a private research university and medical center offering a full-range of undergraduate, graduate and professional degrees.

All IT Downloads from Vanderbilt University» | Visit Vanderbilt University »
Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....  More >>

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....  More >>

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.