Skip to main content
University of Massachusetts Presidents Office
Utility Navigation
  • Directory
  • Careers
  • Log in
  • Academic Affairs, Student Affairs & Equity
  • Access Team: Admin & Finance Support Services
  • Board of Trustees
  • Budget Office
  • Communications
  • Controller
  • Enterprise Risk Management Program
  • Facilities & Operations
  • Government Affairs
  • Human Resources
  • Information Technology Services
  • Innovation and Operational Services
  • Internal Audit
  • Office of the General Counsel
  • Payroll
  • Travel and Expense
  • Treasurer
  • Unified Procurement Services Team
Main navigation
  • About
  • Organization
  • Reports and Initiatives
  • Search
Utility Nav Mobile
  • Directory
  • Careers
  • Log in
  • Academic Affairs, Student Affairs & Equity
  • Access Team: Admin & Finance Support Services
  • Board of Trustees
  • Budget Office
  • Communications
  • Controller
  • Enterprise Risk Management Program
  • Facilities & Operations
  • Government Affairs
  • Human Resources
  • Information Technology Services
  • Innovation and Operational Services
  • Internal Audit
  • Office of the General Counsel
  • Payroll
  • Travel and Expense
  • Treasurer
  • Unified Procurement Services Team
  1. Back to Home

Search UMassP.edu

  • Computer Security and Usage Guidelines
    (Doc. T97-010) University computers and computer related resources are valuable assets that are relied upon heavily for academic, information and decision-making needs. University students and staff rely on the security of the computer systems to protect instructional, research, personal, operational and other sensitive data maintained in those computer systems. It is essential that these systems…, I. Purpose, These Guidelines are issued pursuant to the Board of Trustees' Policy Statement on Electronic Data Security, Electronic Mail and Computer Policy Development (Doc. T97-010, adopted February 5, 1997) and: Ensure the ethical, legal and responsible use of University of Massachusetts (the University) computing resources; Outline responsibilities related to the accessing and usage of computers at the…, II. Scope, Campus procedures regarding computer security and usage shall: Comply with and be based on the laws of the Commonwealth of Massachusetts and the United States and other regulatory agencies. This includes all applicable federal and state laws which govern the use and security of computer systems and data, including the Federal Copyright Law (Title 17 of the U.S. Code); Counterfeit Access Device…, III. Responsibilities, The President, together with the Chancellors, will ensure that: Appropriate and auditable internal controls; and Appropriate and tested business continuity plans; Are in place for the computer systems at the University. Campus procedures regarding computer usage will establish mechanisms to determine which University department(s) shall be responsible for specific computer systems. The individual…, NOT:, Intentionally damage or misuse any University computer system including terminals, microcomputers, printers or other associated equipment; Intentionally write, produce, generate, copy, propagate or attempt to introduce any computer code designed to self-replicate, damage, or otherwise hinder the performance of any computer's memory, file system, or software unless such action is part of…, IV. Computer Systems And Software, Campus procedures regarding computer security and usage shall require that: Only systems/security administrators or their designees can modify the configuration of the University or Campus computing infrastructure by adding or removing network links, computers, or peripherals; Appropriate physical security standards are in place; Administrative and research computer systems contain audit trails…, V. Access, Access may be given to: stand-alone micro, mini or mainframe computers; or to networked computer systems. Student access is primarily for work associated with their course of study, activities related to courses, or administrative tasks related to their association with the University (e.g., accessing their own academic/administrative data such as courses, grades). Staff are given access to…, IV. Computer and Software Usage, Campus procedures regarding computer security and usage shall require that: University's computer systems are used for purposes related to its missions of education, research and public service including instruction, research, administrative tasks and collaborative activities with other entities, including but not limited to colleges/universities and private businesses; Authorized users use…, VII. Compliance And Enforcement, Campus procedures regarding computer security and usage should require that any individual found misusing University computing resources, accessing University computing resources without approval, or otherwise violating these Guidelines may be denied or given limited (i.e., to allow for the performance of required academic or employment related tasks) access to University computer systems and…
    Type: Book page
  • Data Security and Classification Guidelines
    (Doc. T97-010) The University relies heavily on its electronic data processing systems and the data stored in them to meet its educational, research, informational and operational needs. It is essential that these systems be protected from misuse and that both the computer systems and all data be accessed and maintained in a secure environment. Data should be used responsibly and ethically., I. Purpose, These Guidelines are issued pursuant to the Board of Trustees' Policy Statement on Electronic Data Security, Electronic Mail and Computer Policy Development (Doc. T97-010, adopted February 5, 1997) and: Outline responsibilities related to data security, signature imaging and documentation at the University of Massachusetts (the University); Provide guidelines for the security, access and…, II. Scope, Campus procedures regarding data security and classification shall: Comply with and be based on the laws of the Commonwealth of Massachusetts, the United States and other regulatory agencies. This includes all applicable federal and state laws which govern the privacy and confidentiality of data, including the Electronic Communications Privacy Act of 1986, Family Educational Rights and Privacy…, III. Responsibilities, The President, together with the Chancellors, will issue guidelines which will: Define what categories of individuals (e.g., full time, part-time, staff, students, economic partners, other educational institutions, general public, etc.) may access University data; Determine what data are considered "institutional data" for the University. The President shall appoint a Common Services central…, IV. Data Security, Campus standards regarding data security and classification shall require that: University data are protected in a manner which is commensurate with its classification and value; The cost of data security is commensurate with the classification and value of the data being secured; To the extent necessary, information is safeguarded by security systems designed for the protection of, detection of…, V. Data Classification, Campus standards regarding data security and classification shall require that University data classifications are adhered to. Five levels of data classification have been established. The data classifications DO NOT apply to correspondence or memorandum EXCEPT when the correspondence/memorandum contains other than unclassified data. The data classifications determine how the data will be secured…, VI. Data Access and Use, Undefined or unclear guidelines or procedures shall not be construed to imply access authorization. Campus procedures regarding data security and classification shall require that: Only authorized users have access to University data; Access to data other than unclassified data is denied unless the user has obtained explicit approval by the data custodian; Access to data classified as Private,…, VII. Signature Imaging, Data custodians should understand that signature imaging is not a secure method of authorization. Custodians should seek the level of secure authorization most appropriate for their data's classification. Each new use of any electronic authorization process or signature imaging within a computer application must be approved by the Chancellor of the campus instituting the new procedure. The system…, VIII. Compliance And Enforcement, Campus procedures regarding data security and classification should require that any individual found misusing data, divulging confidential data or otherwise violating these Guidelines may be denied or given limited (i.e., to allow for the performance of required academic or employment related tasks) access to data and/or University computer systems, and shall be subject to reprimand, suspension…
    Type: Book page
  • Electronic Mail Guidelines
    (Doc. T97-010) The University works in a large, complex information technology environment requiring communication related to both confidential and public data. New technologies offer the University methods to make this communication easier between students, staff, departments, campuses, colleges, and the world. The University has several types of electronic mail systems on its various computer…, I. Purpose, These Guidelines are issued pursuant to the Board of Trustees' Policy Statement on Electronic Data Security, Electronic Mail and Computer Policy Development (Doc. T97-010, adopted February 5, 1997) and: Define who may use the electronic mail systems controlled and administered by the University of Massachusetts (the University); Outline responsibilities related to electronic mail maintenance and…, II. Scope, Campus procedures relating to electronic mail shall apply to all: Electronic mail (e-mail) created within, sent to, maintained within, or administered by the electronic mail systems of the University of Massachusetts; University e-mail users; Electronic mail as defined in the Definitions Addendum to these Guidelines., III. Responsibilities, The President, together with the Chancellors, shall define what categories of individuals (e.g., full time, part-time, staff, students, economic partners, other educational institutions, general public, etc.) may access University electronic mail systems. The Chancellors, or their designees, will determine: Which University department(s) shall be responsible for administering electronic mail…, IV. Electronic Mail Use Guidelines, Campus procedures relating to electronic mail will require that: Individuals are prohibited from using an electronic mail account assigned to another individual to either send or receive messages. If it is necessary to read another individual's mail (e.g., while they are on vacation, on leave, etc.), surrogacy or message forwarding should be utilized. The University makes e-mail facilities…, V. Electronic Mail Information, Campus procedures relating to electronic mail will require that e-mail users are aware and understand that: The University considers a personal e-mail message to be private correspondence within the limits set forth in this section, but due to the nature of the electronic medium the University cannot guarantee the privacy or security of such correspondence and e-mail users are cautioned that such…, VI. Compliance And Enforcement, Campus procedures regarding electronic mail will require that any individual found breaching the confidentiality of e-mail messages, disclosing confidential University data by using e-mail, or otherwise violating these Guidelines, may be denied or given limited (i.e., to allow for the performance of required academic or employment related tasks) access to the e-mail and/or University computer…
    Type: Book page
  • Definitions Addendum
    Computer Security and Usage Guidelines Data Security and Classification Guidelines Electronic Mail Guidelines, Academic Computing, refers to computer systems that support the research and educational mission of the University., Administrative Computing, refers to computer systems that support the operational functions (e.g., financial, payroll/personnel, library, and student related data such as major, grades, courses, etc.) of the University., Anonymous Connection, is the act of connecting to a remote computer as an unidentified or anonymous user., Approved Users Authorized Users, who have been given explicit access to specific data by the Data Custodian., Audit Trail, is a log(s) of specified access (e.g., when, how, from where and by whom data is accessed). For example, a log of all changes to student grades would be kept to monitor who was accessing such confidential data and what they were doing (e.g., reading, updating, deleting)., Authorized Users, are all students and employees (including student, non-student, faculty, professional, classified, temporary, part-time, and full-time), and contracted consultants of the University of Massachusetts who are required to have access to data to perform their job function, academic assignment, or contractual obligations. Authorized users also include those individuals who are assigned courtesy…, A Bulletin Board/Newsgroup, is a service that enables users to post information for or seek information from others who are interested in a certain topic(s)., Campus or University Computing Infrastructure, refers to the underlying technology (e.g., hardware, cabling, telecommunications and software) required to support the primary University/Campus computing and data communications environments which are usually maintained by computing centers. This does NOT include departmental computing resources (e.g., a department level computing system or network)., Campus Procedures, are statements designed to comply with the requirements of University Guidelines by establishing specific criteria that must be met by University students, staff, consultants, etc., Central Security Specialist, is an individual(s) at each campus and the President's Office who has experience, knowledge and understanding of information systems security practices/requirements and who is responsible for data and computer security planning, oversight, and coordination., Classified Data, refers to University data which has been identified as Operational, Private, Restricted or Confidential., Computer Applications, are sets of computer programs which when run read or modify data, and which can generate output such as reports, bills, checks, etc., Computer Security, refers to the development and implementation of a system of controls which when implemented will REDUCE the PROBABILITY of something negative occurring (e.g., unauthorized file access or modification). Computer Security includes the following categories of control: Administrative (e.g., polices/procedures, personnel, and contingency planning); Hardware; Software (e.g., operating and application…, Computer System(s), refers to the hardware, software and communications equipment used in the processing and storage of electronic data., Confidential Data is University, data whose loss, corruption or unauthorized disclosure would be a violation of federal or state laws/regulations or University contracts., Courtesy Accounts, are accounts on University computer systems which may be provided to individuals who are not University employees, students, or contracted consultants but who have an established relationship with the University and need access. Examples include alumni, business partnerships, individuals from other educational institutions, etc., Data, refers to information regardless of the medium on which it resides (i.e., tape, cartridge, disk, hard drive, etc.), and regardless of its form (e.g. text, graphic, video, voice, etc.)., Data Integrity, refers to the completeness and accuracy of data., Data or Information Security, shall mean the implementation of reasonable safeguards to prevent unauthorized access, theft, removal or misuse of University electronic data (i.e., tape, cartridge, disk, hard drive, etc.)., Data Custodian(s), are the individual(s) responsible for making decisions about the sensitivity and critically of specific University systems and data stored in these systems; determining the classification of data under their control; documenting the use of the specific system(s); and determining which University staff require access to that system and its data. University policy may restrict or dictate the Data…, Degree of Risk or Levels of Risk, refer to the amount of exposure and/or vulnerability associated with a particular entity such as a computer system. Examples of exposure or vulnerability include theft; unauthorized access; unauthorized alternation or destruction of the computer system or the data stored on it; human error; natural disasters, etc., Deleted E-Mail, refers to any e-mail which an e-mail users has specifically deleted/removed from their e-mail mailbox or electronic mail files., Electronic Mail (e-mail), refers to letters, files and messages sent by one computer user or a software agent to a specific user or set of users within the same computer system or over a computer network., Electronic Mail Id, is a unique code which identifies a specific person to an electronic mail system., An Electronic Mail Administrator, is the individual responsible for making decisions about how an electronic mail system(s) should be maintained, determining classes of individuals which may use the electronic mail system, and determining how the mail system and its capabilities will be implemented and secured., An Electronic Mail System, is a computer which has e-mail capabilities on it., Electronic Signature, is the method of ensuring that the purported signer of a document was the actual signer and the document has not been modified since signed., Employees, are all student, non-student (faculty, professional, classified), temporary, part-time, full-time, contracted and consultants who are paid from University funds and require access to electronic data to perform their job function., External E-mail, Users are individuals who communicate with University mail systems from mail systems not controlled or administered by the University (e.g., Internet)., A Filter, is a security method to "hide" e-mail message text from the view of electronic mail maintenance personnel., Idle Time or Time-Out, refers to a capability within computer systems to disconnect an authorized user if that user is logged on and has not communicated with the computer for a specified period of time (i.e., 15 minutes)., Internet, is a network of computers that allows its users to send mail or access data world-wide., Levels of Risk or Degree of Risk, refer to the amount of exposure and/or vulnerability associated with a particular entity such as a computer system. Examples of exposure or vulnerability include theft; unauthorized access; unauthorized alternation or destruction of the computer system or the data stored on it; human error; natural disasters, etc., Licensed Software, is software that has been developed for commercial "sale" or for limited/restricted use. The software developer maintains copyright to the software and sells others the right to use the software for a fee. Note that the developer retains ownership of the software and controls how the software can be used., A Logon or Operator Id, is a unique code that identifies a specific person to the computer system. A Logon or Operator Id may also identify a type of user (i.e., Internet) to the computer system., Mailbox, is the area in the computer in which e-mail users receive electronic mail messages., Message Encryption, is the scrambling of e-mail messages so they are more secure and not easily read by anyone other than the designated recipient who has been given the "key" to unscramble the message., Operational Use Only Data University, data whose loss, corruption or unauthorized disclosure would not necessarily result in any business, financial or legal loss BUT which is made available to Data Custodian approved users only., Packet, refers to a "bundle" of information sent over network. Packets usually include information regarding where the data is being sent, the actual data, and a record indicating the end of the packet., Packet Sniffing, is a technique in which an individual inserts a software program at remote network switches or computers for the purpose of monitoring information sent over the network., A Password, is a confidential, unique code used in conjunction with the logon id to verify that the user trying to access the computer is the person to whom the Logon/Operator ID was assigned., Password Creation Checking, is the process of a computer system comparing a user's password to words in a dictionary; user specific data such as logon id, name, birth date, social security number; and common character sequences such as "123456" or "abcdef"., Private Data, is University data whose disclosure would not result in any business, financial or legal loss BUT involves issues of personal credibility, reputation, or other issues of personal privacy., Protocol, is a set of formats and procedures governing the exchange of information between computer systems., Public Domain Software, is software for which the titles and copyrights have been explicitly relinquished by the author, so that anyone can use it as they please, free of charge., Rebroadcast, is to transmit or make information accessible to individuals not materially involved in the issue that the information relates to (e.g. posting the information to a newsgroup, emailing it to others, or creating a link to the information from a publicly available Web page)., Research Computers, are any University computers which contains data related to faculty/staff/student research. This does not include the accounting data related to the financial functions of a research grant., Restricted Data, is University data whose loss, corruption or unauthorized disclosure would tend to impair the business or research functions of the University, or result in any business, financial, or legal loss., Retention Standards, are requirements which indicate the period of time a type of data or message should be retrievable., Secured Data, refers to data that is available to authorized users who require this access to perform their job function and who have obtained Data Custodian approval for this access., Server, refers to computers that provide resources or information to other computers. There are many types of servers including file servers, terminal servers, and name servers., Shareware, refers to copyrighted software whose license allows the software to be freely copied and shared. The use of Shareware usually requires the payment of a fee after some time period specified in the software's license., Signature Images, refer to the entry of a signature on a computerized document by electronic means., Staff, refers to all non-student (faculty, professional, classified), temporary, part-time, full-time, contracted and consultants who are paid from University funds and require access to electronic data to perform their job function., Students, are all individuals enrolled at the University of Massachusetts and its programs. This includes individuals attending day, continuing education, graduate and/or undergraduate sessions who may be part-time or full-time students. (NOTE: While performing job functions related to student employment with the University, students are considered employees and must therefore abide by employee related…, Student Data, refers to data that is created by University students., Surrogacy, refers to a situation in which an authorized e-mail user has given another authorized e-mail user permission to access certain features of their mail account. The surrogate uses their own mail id to access the other users mail features, they DO NOT use the other users mail id. For example, a Department Head or Director may give their assistant surrogate access to their mailbox so that the…, A Third Party, is any individual, group of individuals, bulletin board, conference or newsgroup either within the University or at any other location world wide who is not originally addressed in the e-mail message., Third Party Data, is any data supplied by and/or maintained for a Third Party., Time-Out, or Idle Time refers to a capability within computer systems to disconnect an authorized user if that user is logged on and has not communicated with the computer for a specified period of time (i.e., 15 minutes)., Trojan Horse, Virus, or Worm, is computer code designed to self-replicate, damage, or otherwise hinder the performance of a computer's memory, file system, or software., Unauthorized User, is any individual accessing data which is other than non-classified to which they have not been given explicit approval by a Data Custodian., Unclassified Data, is University data that does not fall into any of the other data classifications (i.e., Operational, Private, Restricted or Confidential). This data maybe made generally available without specific Data Custodian approval., University Data, is data created, executed or received by an University employee (i.e., full or part time, temporary, professional, classified or faculty) in connection with the transaction of University business. Categories of University data are Financial, General, Medical, Personnel, Student, etc., University E-mail, Users are all individuals who have accounts on electronic mail systems under the control and administration of the University of Massachusetts., University or Campus Computing Infrastructure, refers to the underlying technology (e.g., hardware, cabling, telecommunications and software) required to support the primary University/Campus computing and data communications environments which are usually maintained by computing centers. This does NOT include departmental computing resources (e.g., a department level computing system or network)., University Guidelines, are statements designed to achieve the requirements of University Policies by establishing specific criteria that must be met in Campus Procedures., University Policies, are concise statements of direction and required action issued only by the Board of Trustees., Virus, Worm or Trojan Horse, is computer code designed to self-replicate, damage, or otherwise hinder the performance of a computer's memory, file system, or software., Web Page, refers to a page of information available on the World-Wide web network., World-Wide Web, is a distributed information system that can be accessed to retrieve data in text, video or audio format., Worm, Virus or Trojan Horse, is computer code designed to self-replicate, damage, or otherwise hinder the performance of any computer's memory, file system, or software.
    Type: Book page
  • Policy on Undergraduate Student Transfer and Visitor Interchange & Guidelines (T97-107)
    Doc. T97-107, Passed by the Board of Trustees on December 3, 1997, Policy on Undergraduate Student Transfer and Visitor Interchange, Campuses shall provide opportunities for enrolled students to transfer with ease (transfer interchange) or to take courses (visitor interchange) at any other campus of the University. The President and Chancellors shall take the appropriate steps to implement streamlined transfer interchanges and visitor interchanges. Transfer interchanges and visitor interchanges, shall be available to students…
    Type: Book page
  • Performance Measurement System (T97-111)
    Doc. T97-111, Passed by the Board of Trustees on December 3, 1997 There shall be a performance measurement system for the University of Massachusetts to evaluate campus performance related to the following objectives: To ensure the high quality of academic programs and services. To promote student access and affordability. To recruit qualified undergraduate and graduate students. To promote student success. To…
    Type: Book page
  • Accounts Receivable Policy (T97-118)
    Doc. T97-118, Passed by the Board of Trustees on December 3, 1997, Purpose, Accounts receivable represent balances owed to the University of Massachusetts for tuition and fees, credit sales of goods or services, and reimbursements related to grants and contracts. The purpose of this policy is to: Maximize revenues through collection of all amounts due Ensure compliance with applicable state and federal laws Establish guidelines for the approval, control and accounting…, Scope, This policy pertains to all amounts due the University of Massachusetts. It does not apply to patient receivables, or loans to students, or loans between University funds., Delegation, The Board of Trustees has fiduciary responsibility for the collection of all funds due the University of Massachusetts. The Board of Trustees hereby assigns to the Chancellor of each campus general responsibility for collection of all amounts owed to the University. Responsibility for accounts receivable due the President’s Office or University Central Administrative Services is assigned to the…
    Type: Book page
  • Academic Quality Assessment and Development (AQAD) Guidelines (T98-033)
    Doc. T98-033, A component of the University Performance Measurement System, Doc. T97-111 Academic Quality Assessment and Development is a component of the University Performance Measurement System. The primary purpose of this component is to assess and improve the core academic functions of teaching and learning, research/professional/creative activity, and public service/academic outreach through an ongoing…, Process, Each Program shall be reviewed on a regular cycle. Ordinarily, the length of time between reviews may be no more than five to seven years, but campus procedures may establish the circumstances under which exceptions to this timeframe may be granted. Each Program review shall be conducted with the participation of Program faculty members. Each Program review shall consist, minimally, of the…, Core Criteria and Related Questions, Programs shall ensure that their goals and objectives are linked to the campus mission and strategic priorities. The Program should evaluate its purpose and planning in light of the campus mission and strategic priorities. The review should answer the following questions: What is the Program’s mission and is it clearly aligned with the campus mission and direction? How does the Program’s mission…
    Type: Book page
  • Undergraduate Financial Aid Policy & Guidelines (T98-050)
    Doc. T98-050, Passed by the Board of Trustees on June 3, 1998, University Policy, Qualified undergraduate students shall be admitted to the University of Massachusetts without regard to financial need.
    Type: Book page
  • FormAssembly
    Type: Basic page

Pagination

  • « First First page
  • ‹ Previous Previous page
  • …
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • …
  • Next › Next page
  • Last » Last page
University of Massachusetts Presidents Office
  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
  • YouTube
User account menu
  • Directory
  • Careers
  • Log in

You are on UMassp.edu. For the University of Massachusetts system, visit  Massachusetts.edu.

© University of Massachusetts 2025

Footer - Related Sites
  • Massachusetts.edu
  • UMass Building Authority
  • UMass Club
  • UMass Foundation
  • UMass System Careers