RSS Feed
Knowledgebase : Policies
 

GOSHEN COLLEGE CODE OF CONDUCT FOR USE OF COMPUTING FACILITIES INTRODUCTION Computers and the Internet are powerful tools and an integral part of a GC education. However, it is quite possible to use these technologies in ways that cause problems ra...
GOSHEN COLLEGE ADMINISTRATIVE SYSTEMS SECURITY PROCEDURES Jenzabar information systems are an integral part of the mission of Goshen College. The college has made a substantial investment in human and financial resources to obtain and manage these sys...
PROGRAM CHANGE CONTROL/RELEASE INSTALLATION POLICY FOR ADMINISTRATIVE SYSTEMS The following policy is designed to provide a conceptual framework for understanding the when, why and how of administrative software upgrades. DEFINITION OF TERMS ...
GOSHEN COLLEGE COMPUTER LAB USAGE POLICY ITS maintains high quality public computing facilities across campus for the purpose of making institutionally licensed software available to students and faculty, for research, writing, study and collaboration...
DESKTOP COMPUTING HARDWARE POLICY The college is committed to providing adequate computing equipment for its employees. Currently, that commitment consists of the following guidelines, with planning and budgeting occurring in April of each year: EQ...
DESKTOP COMPUTING HARDWARE POLICY The college is committed to providing adequate computing equipment for its employees. Currently, that commitment consists of the following guidelines, with planning and budgeting occurring in April of each year: EQ...
GC EMAIL AND OFFICIAL COMMUNICATION Goshen College provides all students and employees with free email service accessible via the web at mail.goshen.edu and thru standard mail clients like Thunderbird, Eudora and OS X Mail. Your GC Email account will ...
ITS DATA BACKUP AND RETENTION POLICY (draft, Michael Sherer) The following policy defines ITS processes and procedures for safeguarding GC data and services in the event of hardware failure, natural or manmade disaster, or other related events. I...
USING GC MASS EMAILING LISTS Background Information Technology Services (ITS) has made available a number of mass emailing lists for limited campus use. Sending an email message to any of these lists will distribute it to all of the users on the li...
GOSHEN COLLEGE NETWORK SECURITY POLICY INTRODUCTION Goshen College Network Security Policy outlines a framework for understanding the infrastructure, roles and responsibilities required to create and maintain a secure computing environment while h...
GOSHEN COLLEGE PRIVACY OF ELECTRONIC FILES AND COMMUNICATIONS The following guidelines shall serve to protect the privacy of the Goshen College community. 1. Goshen College computing resources are provided for educational and administrative purpos...
GOSHEN COLLEGE IT PROJECT MANAGEMENT GUIDELINES Goshen College is committed to continuously improving the delivery of IT solutions within budget, on schedule, within scope and in such a way as to best contribute to accomplishing the college's strategi...
SECURE PASSWORD POLICY Choosing a secure password is necessary for protecting data on the Goshen College network. Hackers have developed very powerful password-cracking tools that incorporate extensive word and name dictionaries. Their cracking tools ...
ITS SERVER ROOM ACCESS POLICY Michael Sherer, last updated 3/2011 INTRODUCTION Schertz Computing Center houses the primary server room for the college, which contains ten racks of servers and networking equipment. This policy details who ha...
PROCESSES FOR SOFTWARE ACQUISITION AND INCLUSION ON LAB/CLASSROOM/OFFICE IMAGES Updated: June 2010 Request for Software Acquisition Consideration New software titles requested by faculty or staff and used predominantly by a single department wi...
ITS APPROVED STUDENT CONSULTANTS Sometimes the quickest way to make a Windows PC clean from viruses and spyware and fully functional again is to erase the hard disk and re-install Windows using the factory restore disks provided with most PCs. This pr...
\N\NWHAT ITS CAN DO TO HELP FIX YOUR PC\N\N \N\NPROBLEMS ITS CAN FIX\N\N * Problems connecting to the campus network * Problems installing or upgrading the anti-spyware software. * One virus/spyware infestation per computer/user per year. (See ...