Doc. T08-086, Passed by the Board of Trustees on September 26, 2008, Introduction, Campus information technology departments continue to encounter public safety, data security and system support issues when electronic equipment is attached to University/Campus networks by departments without IT’s prior knowledge and review. Problems can arise with the purchase of new equipment (e.g., servers, etc.) that may not be compatible with the current IT infrastructure at the University…, Processes to Support Policy, To ensure that appropriate IT acquisition and lease reviews occur, campuses shall integrate the attached “Information Technology Acquisition Request for Review” form into their purchasing workflow processes.
Type: Book page
Doc. T03-076, Passed by the Board of Trustees on November 5, 2003 Whereas, the proper governance of the University of Massachusetts depends on trustees who give their time and talent for the benefit of the University; and Whereas, the giving of this service, because of the varied interests and backgrounds of trustees, may result in situations giving rise to possible conflicts of interest; and Whereas, the…
Type: Book page
Doc. T08-109, Passed by the Board of Trustees on December 11, 2008 The Board recognizes that some activities of the University are subject to the provisions of the Fair and Accurate Credit Transactions Act (FACT Act) and its “Red Flag” rules. Therefore, the Board of Trustees adopts the following initial program Identity Theft Prevention Program for the University of Massachusetts system., I. Program Adoption, The University of Massachusetts has adopted this initial Identity Theft Prevention Program ("Program") in compliance with the “Red Flag” rules issued by the Federal Trade Commission pursuant to the Fair and Accurate Credit Transactions ACT (“FACTA”). The University is engaging in activities which are covered by the FACTA Red Flag rules. After consideration of the size and complexity of the…, II. Program Purpose, Under the Red Flag rules, the University is required to establish an “Identity Theft Program” with reasonable policies and procedures to detect, identify, and mitigate identity theft in its covered accounts. The University must incorporate relevant Red Flags into a Program to enable the University to detect and respond to potential identity theft. The University shall ensure that the Program is…, III. Responsible University Official, The President shall designate a senior University official to serve as Program Administrator. The Program Administrator shall exercise appropriate and effective oversight over the Program and shall report regularly to the President on the Program., IV. Program Administration and Maintenance, The Program Administrator is responsible for developing, implementing and updating the Program throughout the University system. The Program Administrator will be responsible for ensuring appropriate training of University staff on the Program, for reviewing any staff reports regarding the detection of Red Flags and the steps for identifying, preventing and mitigating identity theft, determining…, V. Definitions, Pursuant to the Red Flag regulations at 16 C. F. R. § 681.2, the following definitions shall apply to this Program:, Covered accounts:, Any account the University offers or maintains primarily for personal, family or household purposes, that involves multiple payments or transactions. Any other account the University offers or maintains for which there is a reasonably foreseeable risk to customers or to the safety and soundness of the University from Identity Theft., Credit:, The right granted by a creditor to a debtor to defer payment of debt or to incur debt and defer its payment or to purchase property or services and defer payment therefor., Creditor:, An entity that regularly extends, renews, or continues credit., Customer:, Any person with a covered account with a creditor., Identifying information:, Any name or number that may be used, alone or in conjunction with any other information, to identify a specific person,” including: name address telephone number social security number date of birth government issued driver’s license or identification number alien registration number government passport number employer or taxpayer identification number unique electronic identification number…, Identity Theft:, A fraud committed using the identifying information of another person., Red Flag:, A pattern, practice, or specific activity that indicates the possible existence of Identity Theft., VI. Identification of Red Flags, In order to identify relevant Red Flags, the University considers the types of accounts that it offers and maintains, the methods it provides to open its accounts, the methods it provides to access its accounts, and its previous experiences with Identity Theft. The following are relevant Red Flags, in each of the listed categories, which employees should be aware of and diligent in monitoring for:, A. Notifications and Warnings from Credit Reporting Agencies, Report of fraud accompanying a credit report; Notice or report from a credit agency of a credit freeze on a customer or applicant; Notice or report from a credit agency of an active duty alert for an applicant; and Indication from a credit report of activity that is inconsistent with a customer’s usual pattern or activity., B. Suspicious Documents, Identification document or card that appears to be forged, altered or inauthentic; Identification document or card on which a person’s photograph or physical description is not consistent with the person presenting the document; Other document with information that is not consistent with existing customer information (such as if a person’s signature on a check appears forged); and Application for…, C. Suspicious Personal Identifying Information, Identifying information presented that is inconsistent with other information the customer provides (example: inconsistent birth dates); Identifying information presented that is inconsistent with other sources of information (for instance, an address not matching an address on a credit report); Identifying information presented that is the same as information shown on other applications that…, D. Suspicious Account Activity or Unusual Use of Account, Change of address for an account followed by a request to change the account holder's name; Payments stop on an otherwise consistently up-to-date account; Account used in a way that is not consistent with prior use (example: very high activity); Mail sent to the account holder is repeatedly returned as undeliverable; Notice to the University that a customer is not receiving mail sent by the…, E. Alerts from Others, Notice to the University from a customer, identity theft victim, law enforcement or other person that it has opened or is maintaining a fraudulent account for a person engaged in Identity Theft., VII. Detecting Red Flags, The Program’s general Red Flag detection practices are described in this document. The Program Administrator and each campus will develop and implement specific methods and protocols appropriate to meet the requirements of this Program., A. New Accounts, In order to detect any of the Red Flags identified above associated with the opening of a new account, University personnel will take the following steps to obtain and verify the identity of the person opening the account: Require certain identifying information such as name, date of birth, residential or business address, driver's license or other identification; Verify the customer's identity (…, B. Existing Accounts, In order to detect any of the Red Flags identified above for an existing account, University personnel will take the following steps to monitor transactions with an account: Verify the identification of customers if they request information (in person, via telephone, via facsimile, via email); Verify the validity of requests to change billing addresses; and Verify changes in banking information…, VII. Responding to Red Flags and Mitigating Identity Theft, In the event University personnel detect any identified Red Flags, such personnel shall all appropriate steps to respond and mitigate identity theft depending on the nature and degree of risk posed by the Red Flag, including but not limited to the following examples: Continue to monitor an account for evidence of Identity theft; Contact the customer; Change any passwords or other security devices…, Vlll. Staff Training and Reporting, University employees responsible for implementing the Program shall be trained under the direction of the Program Administrator in the detection of Red Flags, and the responsive steps to be taken when a Red Flag is detected. Appropriate staff shall provide reports to the Program Administrator on incidents of identity theft, the effectiveness of the Program and the University’s compliance with the…, IX. Service Provider Arrangements, In the event the University engages a service provider to perform an activity in connection with one or more accounts, the University will take the following steps to ensure the service provider performs its activity in accordance with reasonable policies and procedures designed to detect, prevent, and mitigate the risk of identity theft: Require, by contract, that service providers have such…
Type: Book page
Doc. T09-050, as amended, Passed by the Board of Trustees on September 30, 2009 Latest revision: June 18, 2014, Purpose, To fulfill its mission, the University must make ongoing strategic capital investments in academic, student life, research, and other plant facilities using an appropriate mix of funding sources including state bonds and appropriations, University bonds, capital leases, internal reserves, operating funds, grants, and private gifts. The purpose of the Debt Policy is to ensure the appropriate mix…, I. Introduction, This policy will assist University management in the evaluation of internal and external debt while seeking to maintain an acceptable credit rating and sufficient liquidity. Although the attainment or maintenance of a specific rating is not the main objective of this policy, maintaining an acceptable credit rating that is the same or better than current rating levels will permit the University to…, II. Policy Statement, The University will only incur debt in strict compliance with applicable state and federal law and with debt-related contractual covenants. The University may incur debt to refinance existing debt or to fund capital projects that are consistent with the University’s mission and strategic priorities and/or the University’s capital plan. The University will incur external debt only with the prior…, III. Standards, The President, in consultation with the Vice President(s) and Chancellors, will issue administrative standards to implement this policy. , Doc. T09-050, as amended | Debt Policy, Passed by the Board of Trustees on September 30, 2009 Revised: June 18, 2014
Type: Book page
Doc. T10-088, Passed by the Board of Trustees on December 8, 2010 The University of Massachusetts is committed to providing a safe and secure environment that is supported by qualified employees for all of its students, faculty, staff, and residents to carry out the University’s teaching, research, and public service missions. As a condition of employment, the University will conduct appropriate background…
Type: Book page
Doc. T10-089, Passed by the Board of Trustees on December 8, 2010, Purpose, Scope, and Applicability, Information is a critical asset of the University of Massachusetts and protecting information assets and their related processing systems is the primary goal of the University of Massachusetts Information Security Policy Statement. All information created or used in support of the University of Massachusetts business is considered university information. University information will be protected…, Policy Statement & Security Controls, This policy statement is established to protect the assets and interests of the University, to increase overall information security awareness and to ensure a coordinated approach for implementing, managing and maintaining a control environment based on industry best practices. This policy statement sets the direction for protecting information and IT resources owned and used by the University of…, UMass Information Security Governance, The University of Massachusetts Information Security Policy Statement is approved by the Board of Trustees. The policy statement sets the direction for information security at UMASS. The President shall develop and issue guidelines for campuses to follow in the implementation of this policy. Additional details are included in the UMASS Written Information Security Plan (WISP). The WISP sets forth…
Type: Book page
Doc. T11-069, Passed by the Board of Trustees on September 28, 2011 Fundraising reports to the Advancement Committee of the University of Massachusetts Board of Trustees rely to a large degree on the Reporting Standards developed by the Council for Advancement and Support of Education (CASE). The definitions below are largely an adaption of those found in the CASE Reporting Standards. The University of…, New Cash Gifts: , Outright gifts paid by cash, check, credit card, IRA roll-over, or securities. Excludes all University and State matching funds., New Pledges: , Unconditional pledges and promises to give. Pledges from alumni and friends exclude anticipated matching funds through employers and other 3rd party sources such as donor advised funds and community foundations. All pledges exclude anticipated University and State matching funds. Pledges are generally payable in full within 3-5 years., Pledge Payments: , Payments made in complete or partial fulfillment of recorded current and prior period pledges. 3rd party funds such as employer matching gifts and donor advised funds cannot be used to reduce the pledge balances of alumni and friends. Excludes all University and State matching funds., Private Grants: , Contributions received for either unrestricted or restricted uses that typically come from a corporation, foundation, or other organization, rather than an individual. Specifically excludes all local, state, federal, and foreign government funds, all Indian tribal government funds and enterprises on their behalf, and all revenue that is derived from contract/fee for service work., Life Income Gifts: , Charitable Gift Annuities (CGA), Charitable Remainder Trusts (CRT) (only if UMass is an irrevocable beneficiary), Pooled Income Funds (PIF), shall be recorded at present value on the date the CGA, CRT or PIF is established., Irrevocable Bequest Expectancies:, Provisions in a will, trust, or other testamentary legal document providing a gift to UMass in the future and supported by a legally enforceable contract (irrevocable bequest agreement). May only be reported for donors over the age of 65. Must be reported at present value. Please submit a copy of the irrevocable bequest agreement along with a copy of the will, trust etc. to the UMass Foundation.…, Irrevocable Bequest Payments:, When the gift from an irrevocable bequest expectancy is finally realized/received by the University, it should be recorded in this section. Please record cash value., Bequest Expectancies:, Provisions in a will, trust, or other testamentary legal document providing a gift to UMass. These gifts will be recorded at full face value, but shall be counted below the line for the purpose of showing activity in this important area of development. May only be reported for donors over the age of 65. If the value of the bequest is unknown or cannot be determined, record at $1., Outright Bequest Gifts (Realized Bequests):, Record the dollar amount (cash value) of a gift received from an estate, trust, life insurance policy, retirement plan asset (IRA rollovers should be counted in the cash line), or commercial annuity., Gifts In Kind:, All gifts in kind must be solicited and received with an overriding philanthropic intention. The philanthropic intention must appear at the beginning of the discussion not at the end. Gifts of equipment and software must be counted according to the donor’s educational value not fair market value. Gifts of real and personal property with values in excess of $5000 shall be accompanied by an…, Alumni:, Alumni undergraduate degree, certificate of diploma holders:, Individuals who have an undergraduate degree from the campus., Alumni graduate-only degree, certificate, or diploma holders:, Individuals who have only a graduate degree from the University. Count graduates holding “dual degrees,” both undergraduate and graduate degrees from the campus, in the undergraduate category., Alumni without a degree or diploma:, For the Voluntary Support of Education (VSE) reports, universities/campuses have counted individuals with as little as one semester or even only one degree-credit course with passing grades. For the Board of Trustee reports, the Advancement Committee will not report this category of individuals in the reports. Campuses will report an annual count of alumni donors during the year as part of the…, Students:, Current students actively enrolled in full time degree seeking programs at the campuses. Campuses will report an annual count of all student donors during the fiscal year as part of regular 4th quarter reports.
Type: Book page
Doc. T16-029, Passed by the Board of Trustees on June 15, 2016, Purpose, To establish the essential elements for the codes of student conduct, including standard terms and definitions, expectations of acceptable behavior, and potential consequences for unacceptable conduct reflected in various campus policies and rules; and to require the issuance of standards to be followed by each campus., I. Introduction, In addition to their academic pursuits, students at the University of Massachusetts (the “University”) are expected to be good citizens in their campus community. This requires adherence to standards of behavior and academic accountability set forth by the campus. The codes of student conduct on each campus enable students to understand these obligations. In addition to this Statement of Policy,…, II. Policy Statement, It is the policy of the University that each campus establish a code of student conduct for the purpose of establishing community standards and procedures which foster and protect the academic and civic development of the University’s students in a secure learning environment, maintains reasonable order, and protects the rights of all members of the University community. The codes of student…, III. Responsibilities, The President or designee, in consultation with the General Counsel and the Senior Vice President for Academic Affairs and Student Affairs or designee will issue administrative standards to implement this policy. Each campus’ code of student conduct and related procedures shall comply with the scope of this policy and the standards.
Type: Book page
Doc. T16-040, Passed by the Board of Trustees on September 21, 2016, Purpose, The University of Massachusetts complies with applicable state and federal laws on non-discrimination, harassment, and retaliation including Title IX of the Education Amendments of 1972, Title VII of the Civil Rights Act of 1964, the Violence Against Women Act of 1994, and the Massachusetts anti-discrimination law. This policy states the University’s commitment to assure compliance., I. Introduction, This policy affirms the University of Massachusetts’ (“University’s”) commitment to provide a welcoming and respectful work and educational environment, in which all individuals within the University community may benefit from each other’s experiences and foster mutual respect and appreciation of divergent views. The University will not be tolerant of conduct which violates rights guaranteed by…, II. Policy Statement, The University prohibits unlawful discrimination, harassment (including sexual harassment), and retaliation against anyone based on religion or religious belief, color, race, marital status, veteran or military status, age, sex, gender identity or expression, sexual orientation, national origin, ethnicity, disability, genetic information, or any other legally protected class, in education,…, III. Definitions, For the purposes of this policy, the following definitions apply., Unlawful discrimination, is conduct that is directed at a specific person or persons that subjects them to treatment that adversely affects their employment, application for employment, education, admissions, University benefits, programs, or activities, because of their religion or religious belief, color, race, marital status, veteran or military status, age, sex (including sexual harassment), gender identity or…, Harassment, is conduct by a person or persons against another person or persons based upon their legally protected class that adversely has the effect of: Unreasonably interfering with a person or person’s employment, educational benefits, academic grades or opportunities, or participation in University programs or activities; or Unreasonably interfering with a person or person’s work or academic performance…, Sexual Harassment, is unwelcome conduct of a sexual nature when: Submission to such conduct is made either explicitly or implicitly a term or condition of an individual’s employment, education, or participation in University programs or activities; or Submission to or rejection of such conduct by a person or persons is used as a basis for employment or educational decisions affecting such person or persons, or…, Retaliation, is the interference through intimidation, including threats, coercion, or unlawful discrimination, with an individual’s right or privilege secured under the law [Title IX of the Education Amendments of 1972, Title VII of the Civil Rights Act of 1964, the Violence Against Women Act of 1994, the Massachusetts anti-discrimination laws, or other laws] or interfering with an individual’s right to make…, IV. Responsibilities, Chancellors and the Senior Vice President for Administration & Finance and Treasurer for the President’s Office are directed to disseminate this policy within their communities., V. Standards, The President or designee, in consultation with the General Counsel and Senior Vice President for Administration & Finance and Treasurer, will issue administrative standards to implement this policy. Campuses shall establish campus policies and procedures, within the scope of this policy and the administrative standards.
Type: Book page
Doc. T17-037, Passed by the Board of Trustees on June 20, 2017, Preamble, Whereas shared governance is a set of practices under which the faculty participate in making significant decisions concerning the operation of their institution and encompasses a mechanism for academic staff with training and experience in curriculum, teaching and research to have primary responsibility in academic matters and faculty status; and The principles of shared governance expressed…, Name, This organization shall be known as the Faculty Senate of the University of Massachusetts Dartmouth., A. Authority, The Faculty Senate, in its responsibilities and relationships with other governing components of the Campus and of the University as a whole, shall follow the Board of Trustees' Statement on University Governance (Trustee Document T73-098, as amended), which grants to the Faculty "primary responsibility" in academic matters and faculty status, as defined in that document. In the case of conflict…, B. Role, The Faculty Senate shall be concerned with academic matters and matters relating to the intellectual life of the University of Massachusetts Dartmouth including, but not limited to: Standards and policies for the admission of students, including transfer students. Standards and policies for the granting of honorary degrees and honors awards for students. Standards and policies for awarding a…, C. Composition of the Senate, The membership of the Senate will be defined in the By-laws, but these definitions may not contradict the following principles: Every Academic Department will be a member of a Senate Council as defined in the By-laws. Each Senate Council will be represented by at least one Senator. The Senators representing each Senate Council will be elected by the faculty members therein. There will be members-…, D. Faculty Senate Officers, The President of the Faculty Senate will be elected annually by the members of the Senate from among its members. The duties of the President will be defined in the By-laws. The Secretary of the Faculty Senate will be elected annually by the members of the Senate from among the members of the Steering Committee. The duties of the Secretary will be defined in the By-laws. The Steering Committee…, E. Faculty Senate Committees, The Faculty Senate will have Standing Committees and ad hoc committees, reporting to the Faculty Senate, which will: Consider items related to curriculum, subject matter, the methods and means of instruction, policies regarding research, admissions, libraries, those aspects of student life that relate to the educational process, degree requirements and the granting of degrees, and other items…, F. Constitution and By-laws Amendment Procedures, Amendments to this Constitution will be submitted for referendum by the faculty membership by a vote of a majority of the elected members of the Faculty Senate. All Senators will have an opportunity to cast a vote on amendments to the Constitution. All faculty members eligible to vote in elections to the Faculty Senate will be eligible to vote in a referendum. The Faculty Senate Steering…, G. Procedures for Faculty Senate Recommendations, An item of concern may be brought to the attention of the Faculty Senate through the President of the Senate, its Steering Committee or any Senate Committee. Items may be raised during the course of regular Senate meetings. In all cases where there exists an appropriate University Standing Committee, the items will be sent to it by the Senate President upon receipt of the item. Where no such…
Type: Book page