Who We Are
News & Stories
Feb 7, 2023
Feb 3, 2023
November 11, 2022
November 17, 2022
November 19, 2022
University Wide Events
No Communication Compromises
Areas of Study
Changing the world
Community & Innovation
Research Experiences & Services
Your Journey Starts Here
Tools & Resources
Explore Our Campus
Dec 9, 2022
Administration and Operatio...
2.22 Use of Information Technology Resources
College Hall 106
Last Revised: 5 February 2016
Refer Questions to: Executive Director, Gallaudet Technology Services
This policy applies to all faculty, teachers, staff, and students (University and Clerc Center) in all offices and divisions of Gallaudet University and to all outside organizations or individuals requesting use of information technology (IT) resources.
The use of Gallaudet University computer resources, including access to databases and e-mail accounts, the data and voice networks and network connections, computer laboratory equipment, University owned or leased personal computers, laptops, tablets, pagers, mobile devices, servers, network control devices, printers, faxes, modems, and telephone equipment is limited to Gallaudet students, faculty, teachers, staff and the Board of Trustees. Others may be permitted the use of IT resources, if resources are available and if recommended to the Executive Director, Technology Services by the appropriate administrative officer; however, an annual fee is charged to the user or sponsor. Annual fees are determined by the CIO. For the purpose of this policy, students are considered those currently matriculating at the University in degree granting or certificate programs or enrolled at the Clerc Center. Student status is verified at the beginning and end of each enrollment period. Faculty, teachers, and staff include all those who are classified as regular and extended temporary status, and those who are considered part-time, short-term, or consultants with the approval of the unit administrator. All IT resources provided to employees with a temporary appointment are terminated upon expiration of the appointment and may be renewed if the employee is rehired. The accounts of others terminate when the individual separates from or is no longer affiliated with the University.
All connections to the University network must be authorized by Gallaudet Technology Services. Furthermore, all IT accounts and network addresses must be authorized by the department requesting connections. Individuals applying for IT resources must accept and abide by this policy and by other policies that Gallaudet Technology Services may apply to protect the University’s ability to use IT resources to serve its core functions. Additional departmental policies developed by Gallaudet Technology Services may be enacted in emergency situations, provided they do not negate or contradict the intent of this policy. Any device that physically or logically connects to the University’s data or telephone networks, or that utilizes a University computer or server or technology service owned or managed by the University, is subject to this policy, whether the particular piece of equipment is owned by the University, another entity, or an individual.
Gallaudet University – Gallaudet Technology Services (GTS) is committed to providing members of the University with reliable technology in stable operating condition. When establishing accounts, standard security principles of “least required access” to perform a function must always be used, where administratively feasible. An administrative privileged account must not be used when a non-privileged account will would suffice. However, if requested, GTS may grant temporary or extended local administrative privileges for individual machines depending on job function, need-to-know, and employment status.
There are two levels of access for university owned computers:
User– Default “least required access” level for all users; suitable to perform normal daily functions and assure the highest level of computer stability.
Administrator – Allows for unrestricted access on individual workstations including the ability to install hardware and software, edit the registry, manage default access accounts, and change file level permissions. Administrator access increases the potential for loss of data, violation of copyright laws, and other security compromises. This level of access is a privilege that is tightly controlled by GTS and carries certain inherent responsibilities, increased accountability, and risk of liability.
Requesting Administrative Privileges
Administrator access to an individual’s workstation will only be granted in unique circumstances, for a limited period not to exceed one year, and if there are no other options available to address the specific request. Authorization is granted on a case-by-case basis at the discretion of the GTS executive director and information security officer; additionally, all approved administrative rights access requests will be reviewed for continued use by the executive director and information security officer on an annual basis, at a minimum. To request administrative privileges, create a Help Desk ticket requesting Administrative Privilege which includes a description and justification. GTS will review the request and forward the appropriate form for completion.
The following actions are prohibited on all University IT resources:
Computing, telecommunications, and associated network facilities must be used ethically and legally, in accord with applicable licenses and contracts, and according to their intended use in support of the University’s mission. Any use that would impede teaching or research, hinder the functioning of the University, violate an applicable license or contract, or damage community relations or relations with institutions with whom we share responsibility is a violation of this policy.
In the event that Gallaudet Technology Services, or another appropriate unit of the University, believes that IT resources are being used inappropriately, illegally, or in conflict with this policy, Gallaudet University reserves the right to review individual IT records to the extent necessary to assess the problem and determine responsibility and, if necessary, to disable or delete files, programs, network connections, and/or user accounts. The review may include email messages, other content stored in local or web-based systems, documents and files, and network logs as well as an examination of the logs of personal computers or servers that are attached to the University network, whether or not they are owned by the University. The University also reserves the right to respond to legally-mandated requests for IT records. Abuse of IT privileges can result in appropriate disciplinary action including, but not limited to, referral to the appropriate judicial jurisdiction.
Approved by: Gallaudet University Board of Trustees
Gallaudet University, chartered in 1864, is a private university for deaf and hard of hearing students.
Copyright © 2023 Gallaudet University. All rights reserved.
800 Florida Avenue NE, Washington, D.C. 20002