小黄猫传媒

BP 8211 Personal Mobile Computing

Statement of purpose

小黄猫传媒 provides many technology products and services to support the academic and administrative needs of the College. Individuals who use the College鈥檚 IT resources are expected to follow certain defined behaviors in order to minimize information security risk and protect the College and its constituents.

Protecting students, faculty and staff from the risk of identity theft or unauthorized disclosure of personal information is the primary goal of adopting the best practices described in this policy.

This policy enables 小黄猫传媒 IT staff to perform key operational and maintenance tasks, manage information security, and respond to legal requests.

Students, faculty, and staff often require access to 小黄猫传媒鈥檚 wired and wireless networks using personal mobile computing devices (a.k.a. 鈥淏YOD鈥 or 鈥淏ring Your Own Device鈥). This policy seeks to protect the integrity, availability, and performance of IT resources from intentional or inadvertent disruption by personally owned devices.

小黄猫传媒 IT staff administer all IT resources connected to the network. Because IT does not administer personal devices, these devices present significant risk to the normal operation of the College when connected to the network.

Scope statement

All 小黄猫传媒 (小黄猫传媒) employees, students, and affiliates or other third parties that create, use, maintain, or handle 小黄猫传媒 IT resources are subject to this policy. This policy applies to use of all 小黄猫传媒 owned and managed IT resources, use of any computer or mobile device connected to a 小黄猫传媒 network, all controlled sensitive data stored or transmitted using 小黄猫传媒 IT resources and all users of such data.

Policy summary

Personal technology devices such as personal laptops, tablets, and cell phones shall only be deployed on 小黄猫传媒 networks in accordance with defined 小黄猫传媒 connectivity and usage policy.

Policy

General
  • Use of BYOD is subject to all other 小黄猫传媒 Policies.
  • The theft or loss of a BYOD that was used to connect to internal 小黄猫传媒 services shall be reported to the 小黄猫传媒 Computer Service Desk at 971-722-4400 (or x4400) immediately.
  • All BYOD with direct connectivity to the Internet (e.g. laptops used by employees) that are used to access the 小黄猫传媒 network shall have personal firewall software installed and activated.
Wireless connectivity
  • Guests shall connect BYOD to the Wireless Guest Network (小黄猫传媒-Guest) using a 小黄猫传媒-issued temporary user ID and password.
  • Students, faculty, staff, and affiliates shall connect BYOD to the Wireless 小黄猫传媒 Network (小黄猫传媒-WiFi) using the required authentication mechanism approved and issued by 小黄猫传媒.
Wired connectivity
  • Students, faculty, staff, and affiliates shall not physically connect BYOD to 小黄猫传媒 networked workstations or wall jacks (see Exemptions).
VPN connectivity

If students, faculty, staff, or affiliates connect to 小黄猫传媒 networks via VPN using either a BYOD or 小黄猫传媒 supported device:

  • If BYOD, the user is responsible for ensuring the device meets 小黄猫传媒 security standards.
  • If a 小黄猫传媒 supported device, the user must ensure that the device is available for regular security patching.
Affiliates
  • Affiliates may be granted VPN access per the defined authorization process for the required period only.
  • Where feasible, a 小黄猫传媒 owned and managed device shall be issued to the affiliate for this purpose.

Exemptions

USB drives (鈥渢humb drives鈥) may be connected to computer USB ports.

  • Users should only physically connect personal USB drives when no other alternative is feasible (Example: download data via the wireless network instead of using a USB drive to physically connect).
  • 小黄猫传媒 provides re-charging stations and charge adaptors for recharging BYOD such as personal laptops 鈥 do not recharge using 小黄猫传媒 computer USB ports.
  • 小黄猫传媒 recommends using encrypted USB drives.
  • Scan USB drives for malware prior to connecting to IT resources.

Exceptions

None.

Policy violation

Report non-security-related violations (such as receipt of inappropriate content, other People, Strategy, Equity, and Culture (PSEC) policy violations, general college policy violations, or regulatory compliance violations) to a supervisor, PSEC, or EthicsPoint.

Violation of this policy may result in disciplinary action in accordance with 小黄猫传媒 People Strategy Equity and Culture (PSEC) and/or Student Conduct guidelines.

小黄猫传媒 reserves the right to report security violations or compromises to the appropriate authorities. This may include reporting violations of Federal, State, and local laws and regulations governing computer and network use, or required accreditation reporting.

Anyone who violates this policy may be held liable for damages to 小黄猫传媒 assets, including but not limited to the loss of information, computer software and hardware, lost revenue due to disruption of normal business activities or system down time, and fines and judgments imposed as a direct result of the violation.

小黄猫传媒 reserves the right to deactivate any user鈥檚 access rights (whether or not the user is suspected of any violation of this policy) when necessary to preserve the integrity of IT resources.

Complaint procedures

Report information security and general technical policy violations to the IT Service Desk at 971-722-4400 or servicedesk@pcc.edu, or contact the CIO or CISO.

Governing standards, policies, and guidelines

None.

Definitions

  • Affiliate
    Any person or entity that has been sponsored by a 小黄猫传媒 manager to receive controlled temporary access to 小黄猫传媒 services.

    • This is generally as a result of a contractual relationship with 小黄猫传媒. For example, an air conditioning vendor may require affiliate access to test the HVAC system. A consultant project manager may require affiliate access to access project plans on a 小黄猫传媒 system.
  • Authentication
    Any process by which a system verifies the identity of a user who wishes to access it.

    • Since access control is normally based on the identity of the user who requests access to a resource, authentication is essential to effective security. For example, when someone logs into my小黄猫传媒, the user-ID and password entered authenticates that the person logging in is the owner of the account.
  • Chief Information Officer (CIO)
    Senior manager of the Information Technology (IT) Department and a member of Cabinet.

    • At 小黄猫传媒, the CIO is responsible for all technology, with the exception of:
      • Online Learning (Academic Affairs)
      • Some specialized technology that supports CTE or other engineering programs (e.g. software that supports machine labs, specialized dental technology, etc.)
      • Some technology that supports auxiliary services (e.g. Point of Sale systems in the cafeterias and bookstores)
  • Chief Information Security Officer (CISO)
    Senior manager responsible for information security compliance at 小黄猫传媒.
  • IT Resource
    (At 小黄猫传媒) All Information Technology (IT) resources that are the property of 小黄猫传媒 and include, but are not limited to, all network-related systems; business applications; network and application accounts; administrative, academic and library computing facilities; college-wide data, video and voice networks; electronic mail; video and web conferencing systems; access to the Internet; voicemail, fax machines and photocopiers; classroom audio/video; computer equipment; software and operating systems; storage media; Intranet, VPN, and FTP.

    • IT Resources include resources administered by IT, as well as those administered by individual departments, college laboratories, and other college-based entities.
  • Malware
    Short for 鈥渕alicious software,鈥 malware refers to software programs designed to damage or do other unwanted actions on a computer system. Common examples of malware include viruses, worms, Trojan horses, and spyware.
  • Network
    (In IT) The technology that carries messages between one computer and another.

    • A network is a primary component of technology infrastructure and consists of hardware (e.g. routers, switches) that control and direct traffic; transport technologies (e.g. cables, fibre, wireless radio waves) that transport messages from Point A to Point B; and standards (e.g. Internet Protocol, Ethernet) that facilitate a common understanding of the messages being sent and how they are to be processed.
    • End points (or nodes) on a network are the senders and receivers of the messages and are usually computers (e.g. servers, desktops, laptops) 鈥 but can also be technology such as machine controllers, audio/visual devices, etc.
    • The Internet of Things (IoT) largely replaces people interacting across a network with machines and other technology devices interacting across a network, often using artificial intelligence (AI).
  • Port
    (In IT) The end point of a network message. If network addresses are like a street address, port numbers are like suite or room numbers. Access to a network or computing resource can be controlled by identifying what messages are permitted to pass through a specific port.

    • A network port is a process-specific or application-specific software construct serving as a communication endpoint, which is used by the Transport Layer protocols of Internet Protocol suite, such as User Diagram Protocol (UDP) and Transmission Control Protocol (TCP).
  • USB 鈥淭humb鈥 Drive
    A portable data storage device that includes flash memory. Has a USB connector that plugs into the USB socket on a computer.
  • User
    Any person who makes any use of any 小黄猫传媒 IT resource from any location (whether authorized or not).
  • Virtual Private Network (VPN)
    A dedicated, secure connection between a client computer and a computer network. Usually used to support secure 鈥渞emote access鈥 to a network (e.g. working from home).

    • A VPN provides a secure communication channel over the Internet between a remote device (e.g. home computer) and 小黄猫传媒鈥檚 internal network. The VPN requires authentication to set up the channel and encrypts all traffic flowing through the channel.

Responsible executive

Chief Information Officer

Responsible officer

Chief Information Security Officer (CISO)

Responsible office

Information Technology Department

Last revision date

09-09-2024