Loyola University Chicago

- Navigation -

Loyola University Chicago

University Policies

Information Technology Services



Policy NameDescriptionCompliance DriverApplicabilityLast Review
Acceptable use of Electronic University Resources Computing, networking, telephony and information resources at the University, including access to local, national and international networks, are available to support students, faculty and staff as they carry out the University's instructional, research, health care, administration and public service missions. Therefore, the University encourages and promotes the access and use of these resources by the University community. However, access and use which do not support the University mission are subject to regulation and restriction to insure that they do not interfere with this legitimate work. Any access and use of computing, networking, telephony and information resources must not interfere with the University's instructional, research, health care and public service missions and should be consistent with the person's educational, scholarly, research, service, operational or management activities within the University. Those who access and use University computing, networking, telephony and information resources are to take reasonable and necessary measures to safeguard the operating integrity of the systems and their accessibility by others, while acting to maintain a working environment conducive to carrying out the mission of the University efficiently and productively. n/a Students, faculty, staff and guests 7/12/2013
Digital Millennium Copyright Act Policy Title II of the Digital Millennium Copyright Act ("DMCA") of 1998 limits the liability of online service providers, such as Loyola University Chicago, for certain copyright infringement liability if various procedures are followed. This policy is intended to take advantage of the liability protections in the DMCA. Loyola University Chicago respects the rights of holders of copyrights, their agents and representatives and will implement appropriate policies and procedures to support these rights without infringing on the legal use, by individuals, of those materials. Legal use can include, but is not limited to, ownership, license or permission, and fair use under the US Copyright Act. Employees and students need to be aware of the rights of copyright owners. n/a Students, faculty, staff 7/12/2013
Ownership and Use of Data This policy pertains to the compilations of data collected and generated by faculty, staff and students of the University, with and without university resources, including access and use of computing resources, facilities and services. Access and use of university computing resources and services is presumed be consistent with university rules and regulations on the matter, including university personnel policies, faculty and student codes of conduct, departmental policies and procedures, and other Information Services policies on computer use. n/a Students, faculty, staff 7/17/2013
Rights and Responsibilities when using Electronic University Resources Members of the University community and others extended access privileges by the University can expect certain rights as they use the network and its services and include privacy, safety and intellectual rreedom. There are also responsibilities that must be met as part of the privilege of network access. All who access and use the University network are expected to live up to these responsibilities. If you knowingly violate a network responsibility, your network access may be suspended subject to University policies and procedures. n/a Students, faculty, staff and guests 7/17/2013
Acceptable Use of University Computing Labs Access and use of public-access facilities, e.g., computing centers and computer labs, are available to students, faculty and staff to help them accomplish the following, in decreasing order of priority for resource allocation and scheduling. Course work and the university goals for students as presented in the Computers in Teaching and Learning document, undergraduate, graduate, and postgraduate research, other research publishable under the name of the University, career placement, and other personal enrichment goals, including professional development. n/a Students, faculty, staff 7/17/2013
Cloud Computing Policy The purpose of this policy is to ensure that Loyola Protected or Loyola Sensitive data is not inappropriately stored or shared using public cloud computing and/or file sharing services. Cloud computing and file sharing, for this purpose, is defined as the utilization of servers or information technology hosting of any type that is not controlled by, or associated with, Loyola University Chicago for services such as, but not limited to, social networking applications (i.e. blogs and wikis), file storage (drop box), and content hosting (publishers text book add-ons). n/a Students, faculty, staff 9/13/2012
Access and Responsible Use of University E-Mail Systems The University has the responsibility and duty to maintain the integrity, operation and availability of its electronic mail systems for access and use by the University community to advance the University's missions in education, research, health care and public service. Access to the University network and its electronic mail systems is a privilege and certain responsibilities accompany that privilege. All electronic mail files which are transmitted and received using University networks or which are stored on University systems are University records. n/a Students, faculty, staff and guests 7/17/2013
Electronic Mail and Voice Mail Use and Disclosure Policy This document sets forth Loyola University Chicago's policy with regard to access and disclosure of electronic mail or voice mail messages sent or received by university faculty, students, and staff through Loyola's electronic and voice mail systems. It also sets forth policies on the proper use of these systems. While other Loyola policies do address the issues of information privacy and use of university resources (see Related Policies at Loyola in this document), there are aspects of electronic and voice mail which these policies do not address that are addressed in this document. n/a Students, faculty, staff 10/29/2012
Access Use of University Electronic Mail Systems for Electronic Mass Communication This policy pertains to the access and use of University electronic mail systems for electronic mass communications which includes chain letters, broadcast messages, electronic distribution lists and electronic discussion lists. Use of University electronic mail systems for electronic mass communication will be regulated so as not to become a nuisance to the University community using these systems, nor to become wasteful of University computing and networking resources by creating unnecessary or excessive network traffic, nor to affect adversely, in other ways, the operation and performance of these systems. In some situations, e.g., electronic chain letters and broadcast messages about non-University business, these systems are not to be used at all. n/a Students, faculty, staff and guests 7/17/2013
Data Classification Policy This policy covers all data produced, collected or used by Loyola University Chicago, its faculty staff, student workers, consultants or agents during the course of University business. n/a Students, faculty, staff and guests 7/12/2013
Protected Data & Sensitive Data Identification Policy This policy covers all computers and electronic devices capable of storing or transmitting electronic data that are owned or leased by Loyola University Chicago, consultants or agents of Loyola University Chicago and any parties who are contractually bound to handle data produced by Loyola. The purpose of this policy is to ensure that Loyola Protected or Loyola Sensitive data is not inappropriately stored on Loyola computers and electronic devices through systematic electronic examination. n/a Students, faculty, staff and guests 7/17/2013
Electronic Security of Loyola Protected & Sensitive Data Policy This policy covers any data that has been classified as either Loyola Protected Data or as Loyola Sensitive Data and is stored electronically (covered electronic documents). The purpose of this policy is to provide security practices for faculty, staff, student workers, consultants or agents of Loyola University Chicago and any parties who are contractually bound to handle data produced by Loyola, who produce or have access to covered electronic documents. n/a Students, faculty, staff and guests 7/12/2013
Physical Security of Loyola Protected & Sensitive Data Policy This policy covers any data that has been classified as either Loyola Protected data or as Loyola Sensitive data and is stored on paper (covered paper documents). The purpose of this policy is to provide physical security practices for employees, student workers, consultants or agents of Loyola University Chicago and any parties who are contractually bound to handle data produced by Loyola, who produce or have access to covered paper documents. n/a Students, faculty, staff and guests 7/12/2013
Disposal of Loyola Protected & Sensitive Data Policy This policy covers disposal of all Loyola Protected data and all Loyola Sensitive data, regardless of the storage medium. The purpose of this policy is to provide departments and users with the standards for disposing of Loyola Protected data and with options for disposing of Loyola Sensitive data. n/a Students, faculty, staff and guests 7/12/2013
Encryption Policy This policy covers all computers, electronic devices, and media capable of storing electronic data that house Loyola Protected data or Loyola Sensitive data as defined by the Data Classification Policy. This policy also covers the circumstances under which encryption must be used when data is being transferred. The purpose of this policy is to establish the types of devices and media that need to be encrypted, when encryption must be used, and the minimum standards of the software used for encryption. n/a Students, faculty, staff 7/12/2013
Personal Information Protection Compliance Review Protocol The Personal Information Protection Compliance Review Protocol covers all users of computers, electronic devices, and media capable of storing Loyola Protected data or Loyola Sensitive data as defined by the Data Classification Policy. The purpose of this protocol is to ensure that all divisions and departments of Loyola University Chicago are in, and remain in, compliance with the Policies established for the security of Loyola Protected data or Loyola Sensitive data. n/a Students, faculty, staff 7/13/2013
Data Breach Response Policy This policy covers all computer systems, network devices, and any additional systems and outputs containing or transmitting Loyola Protected data or Loyola Sensitive data. The purpose of this policy is to provide a process to report suspected thefts involving data, data breaches or exposures (including unauthorized access, use, or disclosure) to appropriate individuals; and to outline the response to a confirmed theft, data breach or exposure based on the type of data involved. n/a Students, faculty, staff 7/12/2013
Access Control Policy Centralized computer facilities will be protected in physically secure locations with controlled access. They will also have appropriate environmental safeguards. Departmental computers housing Loyola Sensitive or Loyola Public data may require physical and environmental security safeguards. All servers containing Loyola Protected data must be housed in an approved ITS data center. n/a Students, faculty, staff and guests 7/12/2013
Antivirus Policy Regulates all computers using the Loyola network regarding the protection of information via accepted antivirus software. Computers and systems may be required to use antivirus software depending on their operating system. n/a Students, faculty, staff and guests 7/12/2013
Security Awareness Policy Effective information security requires a high level of participation from all members of the University and all must be well informed of their responsibilities. n/a Students, faculty, staff 6/4/2013
Security Policy Overarching policy that establishes the University’s approach to managing information security and risks. Provides guidance to identify and prevent compromises of information security around the University’s computing, networking, telephony and information resources. n/a Students, faculty, staff and guests 7/12/2013

Loyola

CHICAGO | ROME | BEIJING


LOYOLA UNIVERSITY CHICAGO · 1032 W. Sheridan Rd., Chicago, IL 60660 · 773-274-3000
webmaster@luc.edu · Text-only Version · © Copyright & Disclaimer 2012

Notice of Non-discriminatory Policy