Skip to main content
University of Massachusetts Presidents Office
Utility Navigation
  • Directory
  • Careers
  • Log in
  • Academic Affairs, Student Affairs & Equity
  • Access Team: Admin & Finance Support Services
  • Board of Trustees
  • Budget Office
  • Communications
  • Controller
  • Enterprise Risk Management Program
  • Facilities & Operations
  • Government Affairs
  • Human Resources
  • Information Technology Services
  • Innovation and Operational Services
  • Internal Audit
  • Office of the General Counsel
  • Payroll
  • Travel and Expense
  • Treasurer
  • Unified Procurement Services Team
Main navigation
  • About
  • Organization
  • Reports and Initiatives
Utility Nav Mobile
  • Directory
  • Careers
  • Log in
  • Academic Affairs, Student Affairs & Equity
  • Access Team: Admin & Finance Support Services
  • Board of Trustees
  • Budget Office
  • Communications
  • Controller
  • Enterprise Risk Management Program
  • Facilities & Operations
  • Government Affairs
  • Human Resources
  • Information Technology Services
  • Innovation and Operational Services
  • Internal Audit
  • Office of the General Counsel
  • Payroll
  • Travel and Expense
  • Treasurer
  • Unified Procurement Services Team
  1. Back to Home

Search UMassP.edu

  • Policy on Codes of Conduct For University Vendor Relationships & Guidelines (T08-028)
    Doc. T08-028, Passed by the Board of Trustees on March 19, 2008 The University of Massachusetts will adhere to the highest ethical principles in its relationships with vendors and the procurement of any goods and services. These principles will assure that all goods and services are of the highest quality and value for the best competitive price possible. All such goods and services shall be procured in such a…
    Type: Book page
  • UMass Medical School Tobacco Free Environment/No Smoking Policy (T08-029)
    Doc. T08-029, Passed by the Board of Trustees on March 19, 2008, Policy Statement, UMass Medical School (UMMS) promotes a smoke and tobacco free environment across our campuses in order to model and encourage healthy behaviors which are consistent with the UMMS mission and purpose; an institution dedicated to the education and training of health care professionals. Accordingly, everyone is prohibited from smoking or using tobacco products in any UMMS vehicle, building, facility…, Reason for Policy, The problem of secondhand smoke in the workplace is well documented. It has been determined by the U.S. Surgeon General that there is no risk-free level of exposure to second hand smoke and therefore secondhand smoke is hazardous to the health of employees and visitors. Providing smoking-allowed areas is inconsistent with the mission of UMMS. This policy is designed to align our policies and…, Entities Affected By This Policy, Including, but not limited to all employees, faculty, students, volunteers, vendors, and contractors of the university, any visitors to the university and any vehicle, building, facility, site, garage, grounds, and adjacent grounds owned, leased or controlled by the university., Related Documents, General Laws of Massachusetts Chapter 270: Section 22. Smoking in public places. U.S. Surgeon report, The Health Consequences of Involuntary Exposure to Tobacco Smoke, 2006. Orientation Policy, HR 06.03.04 Corrective Action Policy, HR 06.06.02, Scope, The smoking, use, dispensing or sale of any tobacco product is prohibited within any vehicle, building, facility, site, grounds, and garage owned, leased or controlled by UMMS., Responsibilities, All Employees, – Employees are responsible for executing safe practices including: Learning and adhering to the Tobacco Free Environment/No Smoking Policy, and any other UMMS-specific policies and procedures associated with this policy. Reporting any violations of the Tobacco Free Environment/No Smoking Policy to their supervisor. Reporting any unsafe conditions related to Tobacco Free Environment/No Smoking…, All Students –, Students shall comply with this policy and report any violations of this policy to the Associate Dean for Student Affairs. Students desiring to stop smoking shall be responsible for reviewing tobacco cessation benefits available through their health insurance provider., Managers and Supervisors –, Managers and supervisors are responsible for safe practices of employees including: Ensuring staff receive appropriate orientation to the Tobacco Free Environment/No Smoking Policy, including job-specific and area procedures meant to comply with the policy. Monitoring compliance with this policy and procedures. Communicating safety issues and concerns to Facilities as necessary in regards to the…, Public Safety –, Public Safety staff who observes any individual violating this policy will notify/remind the individual of this policy., Employee Assistance Program –, EAP shall provide tobacco cessation consultation and referral to employees, faculty, students, and volunteers. EAP shall be a resource for on-going support, education, and training of employees, and a referral resource for managers responsible for overseeing employee compliance. EAP shall provide individual or group counseling for nicotine addiction at no cost to the employee, and shall provide…, Human Resources –, Human Resources shall inform employees of this policy and shall make this policy available on the HR intranet site. A copy shall be included in the student handbook. A discussion of this policy shall take place at all new employee orientations. HR shall provide benefits information and assist managers/supervisors with corrective action procedures when notified of a violation., Facilities –, Facilities shall obtain, install and maintain signage necessary to inform employees, faculty, students, volunteers, visitors and contractors of the existence of this policy. Signage shall be posted at the entrances of buildings and garages owned, leased or controlled by UMMS., Definitions, Smoke Free Environment, – The prohibition of smoking or use of tobacco products in the buildings, facilities, sites, garages and adjacent grounds owned, leased, or controlled by UMMS., Tobacco Products –, Cigarettes, cigars, pipe tobacco, chewing tobacco, snuff, including but not limited to tobacco in other forms, such as shredded, compressed, plugs, and flakes., Violation –, as defined by the intentional or unintentional failure to conform to the directives of the policy. It is a violation of this policy if any employee, student, staff person, physician, faculty, vendor or any visitor in a UMMS vehicle, building, facility, site, garage, and adjacent grounds owned, leased, or controlled by UMMS to use, sell or dispenses any tobacco product., UMMS Property  –, All buildings, facilities, sites, garages and adjacent grounds owned, leased, or controlled by UMMS, as indicated on the UMMS website.
    Type: Book page
  • Graduate Tuition Waivers for Veterans (T08-039)
    Doc. T08-039, Passed by the Board of Trustees on March 19, 2008 Latest revision: June 12, 2008 To approve graduate tuition waivers for Massachusetts-resident veterans.    
    Type: Book page
  • Policy on the Welcome Home Waiver Program (T08-059)
    Doc. T08-059, Passed by the Board of Trustees on June 12, 2008 The University shall award an annual mandatory fee waiver of up to $2,000 to all degree-seeking Massachusetts resident undergraduate and graduate student veterans who have received a bonus from the Commonwealth pursuant to Subsection (1) of Section 16 of Chapter 130 of the Acts of 2005. Said waivers are granted for a maximum of eight semesters, or…
    Type: Book page
  • Information Technology Acquisition Policy (T08-086)
    Doc. T08-086, Passed by the Board of Trustees on September 26, 2008, Introduction, Campus information technology departments continue to encounter public safety, data security and system support issues when electronic equipment is attached to University/Campus networks by departments without IT’s prior knowledge and review. Problems can arise with the purchase of new equipment (e.g., servers, etc.) that may not be compatible with the current IT infrastructure at the University…, Processes to Support Policy, To ensure that appropriate IT acquisition and lease reviews occur, campuses shall integrate the attached “Information Technology Acquisition Request for Review” form into their purchasing workflow processes.
    Type: Book page
  • Conflict of Interest Disclosure Policy For Trustees (T03-076)
    Doc. T03-076,   Passed by the Board of Trustees on November 5, 2003 Whereas, the proper governance of the University of Massachusetts depends on trustees who give their time and talent for the benefit of the University; and Whereas, the giving of this service, because of the varied interests and backgrounds of trustees, may result in situations giving rise to possible conflicts of interest; and Whereas, the…
    Type: Book page
  • Identity Theft Prevention Program (T08-109)
    Doc. T08-109, Passed by the Board of Trustees on December 11, 2008 The Board recognizes that some activities of the University are subject to the provisions of the Fair and Accurate Credit Transactions Act (FACT Act) and its “Red Flag” rules. Therefore, the Board of Trustees adopts the following initial program Identity Theft Prevention Program for the University of Massachusetts system., I. Program Adoption, The University of Massachusetts has adopted this initial Identity Theft Prevention Program ("Program") in compliance with the “Red Flag” rules issued by the Federal Trade Commission pursuant to the Fair and Accurate Credit Transactions ACT (“FACTA”). The University is engaging in activities which are covered by the FACTA Red Flag rules. After consideration of the size and complexity of the…, II. Program Purpose, Under the Red Flag rules, the University is required to establish an “Identity Theft Program” with reasonable policies and procedures to detect, identify, and mitigate identity theft in its covered accounts. The University must incorporate relevant Red Flags into a Program to enable the University to detect and respond to potential identity theft. The University shall ensure that the Program is…, III. Responsible University Official, The President shall designate a senior University official to serve as Program Administrator. The Program Administrator shall exercise appropriate and effective oversight over the Program and shall report regularly to the President on the Program., IV. Program Administration and Maintenance, The Program Administrator is responsible for developing, implementing and updating the Program throughout the University system. The Program Administrator will be responsible for ensuring appropriate training of University staff on the Program, for reviewing any staff reports regarding the detection of Red Flags and the steps for identifying, preventing and mitigating identity theft, determining…, V. Definitions, Pursuant to the Red Flag regulations at 16 C. F. R. § 681.2, the following definitions shall apply to this Program:, Covered accounts:, Any account the University offers or maintains primarily for personal, family or household purposes, that involves multiple payments or transactions. Any other account the University offers or maintains for which there is a reasonably foreseeable risk to customers or to the safety and soundness of the University from Identity Theft., Credit:, The right granted by a creditor to a debtor to defer payment of debt or to incur debt and defer its payment or to purchase property or services and defer payment therefor., Creditor:, An entity that regularly extends, renews, or continues credit., Customer:, Any person with a covered account with a creditor., Identifying information:, Any name or number that may be used, alone or in conjunction with any other information, to identify a specific person,” including: name address telephone number social security number date of birth government issued driver’s license or identification number alien registration number government passport number employer or taxpayer identification number unique electronic identification number…, Identity Theft:, A fraud committed using the identifying information of another person., Red Flag:, A pattern, practice, or specific activity that indicates the possible existence of Identity Theft., VI. Identification of Red Flags, In order to identify relevant Red Flags, the University considers the types of accounts that it offers and maintains, the methods it provides to open its accounts, the methods it provides to access its accounts, and its previous experiences with Identity Theft. The following are relevant Red Flags, in each of the listed categories, which employees should be aware of and diligent in monitoring for:, A. Notifications and Warnings from Credit Reporting Agencies, Report of fraud accompanying a credit report; Notice or report from a credit agency of a credit freeze on a customer or applicant; Notice or report from a credit agency of an active duty alert for an applicant; and Indication from a credit report of activity that is inconsistent with a customer’s usual pattern or activity., B. Suspicious Documents, Identification document or card that appears to be forged, altered or inauthentic; Identification document or card on which a person’s photograph or physical description is not consistent with the person presenting the document; Other document with information that is not consistent with existing customer information (such as if a person’s signature on a check appears forged); and Application for…, C. Suspicious Personal Identifying Information, Identifying information presented that is inconsistent with other information the customer provides (example: inconsistent birth dates); Identifying information presented that is inconsistent with other sources of information (for instance, an address not matching an address on a credit report); Identifying information presented that is the same as information shown on other applications that…, D. Suspicious Account Activity or Unusual Use of Account, Change of address for an account followed by a request to change the account holder's name; Payments stop on an otherwise consistently up-to-date account; Account used in a way that is not consistent with prior use (example: very high activity); Mail sent to the account holder is repeatedly returned as undeliverable; Notice to the University that a customer is not receiving mail sent by the…, E. Alerts from Others, Notice to the University from a customer, identity theft victim, law enforcement or other person that it has opened or is maintaining a fraudulent account for a person engaged in Identity Theft., VII. Detecting Red Flags, The Program’s general Red Flag detection practices are described in this document. The Program Administrator and each campus will develop and implement specific methods and protocols appropriate to meet the requirements of this Program., A. New Accounts, In order to detect any of the Red Flags identified above associated with the opening of a new account, University personnel will take the following steps to obtain and verify the identity of the person opening the account: Require certain identifying information such as name, date of birth, residential or business address, driver's license or other identification; Verify the customer's identity (…, B. Existing Accounts, In order to detect any of the Red Flags identified above for an existing account, University personnel will take the following steps to monitor transactions with an account: Verify the identification of customers if they request information (in person, via telephone, via facsimile, via email); Verify the validity of requests to change billing addresses; and Verify changes in banking information…, VII. Responding to Red Flags and Mitigating Identity Theft, In the event University personnel detect any identified Red Flags, such personnel shall all appropriate steps to respond and mitigate identity theft depending on the nature and degree of risk posed by the Red Flag, including but not limited to the following examples: Continue to monitor an account for evidence of Identity theft; Contact the customer; Change any passwords or other security devices…, Vlll. Staff Training and Reporting, University employees responsible for implementing the Program shall be trained under the direction of the Program Administrator in the detection of Red Flags, and the responsive steps to be taken when a Red Flag is detected. Appropriate staff shall provide reports to the Program Administrator on incidents of identity theft, the effectiveness of the Program and the University’s compliance with the…, IX. Service Provider Arrangements, In the event the University engages a service provider to perform an activity in connection with one or more accounts, the University will take the following steps to ensure the service provider performs its activity in accordance with reasonable policies and procedures designed to detect, prevent, and mitigate the risk of identity theft: Require, by contract, that service providers have such…
    Type: Book page
  • University Debt Policy & Administrative Standards (T09-050)
    Doc. T09-050, as amended, Passed by the Board of Trustees on September 30, 2009 Latest revision: June 18, 2014, Purpose, To fulfill its mission, the University must make ongoing strategic capital investments in academic, student life, research, and other plant facilities using an appropriate mix of funding sources including state bonds and appropriations, University bonds, capital leases, internal reserves, operating funds, grants, and private gifts. The purpose of the Debt Policy is to ensure the appropriate mix…, I. Introduction, This policy will assist University management in the evaluation of internal and external debt while seeking to maintain an acceptable credit rating and sufficient liquidity. Although the attainment or maintenance of a specific rating is not the main objective of this policy, maintaining an acceptable credit rating that is the same or better than current rating levels will permit the University to…, II. Policy Statement, The University will only incur debt in strict compliance with applicable state and federal law and with debt-related contractual covenants. The University may incur debt to refinance existing debt or to fund capital projects that are consistent with the University’s mission and strategic priorities and/or the University’s capital plan. The University will incur external debt only with the prior…, III. Standards, The President, in consultation with the Vice President(s) and Chancellors, will issue administrative standards to implement this policy.  , Doc. T09-050, as amended | Debt Policy, Passed by the Board of Trustees on September 30, 2009 Revised: June 18, 2014
    Type: Book page
  • Policy On Employee Background Reviews & Guidelines (T10-088)
    Doc. T10-088, Passed by the Board of Trustees on December 8, 2010 The University of Massachusetts is committed to providing a safe and secure environment that is supported by qualified employees for all of its students, faculty, staff, and residents to carry out the University’s teaching, research, and public service missions. As a condition of employment, the University will conduct appropriate background…
    Type: Book page
  • Information Security Policy (T10-089)
    Doc. T10-089, Passed by the Board of Trustees on December 8, 2010, Purpose, Scope, and Applicability, Information is a critical asset of the University of Massachusetts and protecting information assets and their related processing systems is the primary goal of the University of Massachusetts Information Security Policy Statement. All information created or used in support of the University of Massachusetts business is considered university information. University information will be protected…, Policy Statement & Security Controls, This policy statement is established to protect the assets and interests of the University, to increase overall information security awareness and to ensure a coordinated approach for implementing, managing and maintaining a control environment based on industry best practices. This policy statement sets the direction for protecting information and IT resources owned and used by the University of…, UMass Information Security Governance, The University of Massachusetts Information Security Policy Statement is approved by the Board of Trustees. The policy statement sets the direction for information security at UMASS. The President shall develop and issue guidelines for campuses to follow in the implementation of this policy. Additional details are included in the UMASS Written Information Security Plan (WISP). The WISP sets forth…
    Type: Book page

Pagination

  • « First First page
  • ‹ Previous Previous page
  • …
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • …
  • Next › Next page
  • Last » Last page
University of Massachusetts Presidents Office
  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
  • YouTube
User account menu
  • Directory
  • Careers
  • Log in

You are on UMassp.edu. For the University of Massachusetts system, visit  Massachusetts.edu.

© University of Massachusetts 2026

Footer - Related Sites
  • Massachusetts.edu
  • UMass Building Authority
  • UMass Club
  • UMass Foundation
  • UMass System Careers