University Policy 8030 Desktop, Laptop, And Tablet PC Computing Standards

1y ago
8 Views
3 Downloads
512.10 KB
5 Pages
Last View : 2m ago
Last Download : 3m ago
Upload by : Kairi Hasson
Transcription

University Policy 8030Desktop, Laptop, and Tablet PC Computing StandardsEffective DateNovember 1997Last Revision DateJanuary 2020Responsible PartyVice President and Chief Financial Officer, (208) 426-1200Associate Vice President and Chief Information Officer, (208) 426-5775Scope and AudienceThis policy applies to all University colleges, departments, divisions, and units.1. Policy PurposeTo provide reliable desktop, laptop, and tablet PC platforms to enhance the workflow, security,and productivity of the University community. These standards are set forth to provideconsistency, support, access to, and the secure use of University systems.2. Policy StatementDesktop, laptop, and tablet PC computing standards apply to all colleges, departments, divisions,and units of Boise State University to promote the secure sharing of information throughout theinstitution. Standards promote device and data security and compatibility for thorough,consistent support from the Office of Information Technology and vendors.Page 1 of 5

University Policy 8030Desktop, Laptop, and Tablet PC Computing Standards3. Responsibilities and Procedures3.1 Modification of Standards3.1.1. Responsibility for StandardsResponsibility for these standards belongs to the Associate Vice President and ChiefInformation Officer. Standards will be periodically evaluated and reviewed. Hardware andsoftware standards are updated regularly.3.1.2 Updates of Supported ProductsA list of supported products will be updated regularly and be made available to the Universitycommunity at: rity-policy-standardsexception.a. It is the responsibility of individual departments and users to stay current on productssupported and recommended.b. These standards apply to all acquisitions independent of acquisition method or fundingsource, e.g., grants, donations, rental or leases, etc.3.1.3 Exception to Standardsa. Any college, department, division, or unit that wishes an exception to these standards mustsubmit the exception request at: ritypolicy-standards-exception. The exception request will, at a minimum, state the following: The requested exception Justification A signed statement of support from the appropriate dean or director.b. The user must commit funding and other appropriate resources to providing hardware andsoftware support for the exception. Only the Chief Information Security Officer canauthorize an exception to these standards.Page 2 of 5

University Policy 8030Desktop, Laptop, and Tablet PC Computing Standards3.2 Standards3.2.1 Full SupportSupport from the product vendor including security and technology updates are still available,the product is fully compatible with campus administrative systems, OIT staff members are fullyproduct knowledgeable, and documentation is available. For fully supported products users mayexpect problem resolution, user seminars may be offered, and product consultation may bearranged.3.2.2 Partial SupportThe product may or may not be supported by the vendor, the product may not be fullycompatible with campus administrative systems or specific known compatibility issues exist, andproduct documentation and user training is not available. Under these circumstances, OIT staffwill provide limited product support with no claims as to customer satisfaction.3.2.3 Mail and CalendaringGoogle G Suite for Education is the primary tool for campus email, calendaring, andcollaboration for the campus community. It is fully supported by the Office of InformationTechnology.3.2.4 Web BrowsersThe current versions of the three most commonly used browsers throughout the browser lifecycle. The campus administrative systems can dictate which browsers are covered by fullsupport. Information about Browser versions can be found at: tandards.3.2.5 Desktop Computers StandardsThe Operating System installed on the computer will be fully supported within themanufacturer’s support product life cycle or end of life statements. Anti-virus software isrequired for all desktop devices. Security vulnerabilities and campus administrative systems candictate the rate at which new Operating System versions are introduced to campus. DesktopConfiguration Management software is required an all University-owned desktop computers tofacilitate University device inventory and patching requirements. All University-owned desktopcomputers must be joined to the Boise State network domain for security and compliancerequirements. Reference support questions at: tandards.Page 3 of 5

University Policy 8030Desktop, Laptop, and Tablet PC Computing Standards3.2.6 Laptops and Tablet PCsExtra security precautions including data encryption is required on laptops and/or tablet PCs incase the device is lost or stolen. Anti-virus software is required for all laptop and tablet PCdevices. Desktop Configuration Management software is required an all University-ownedlaptops and tablet PCs to facilitate University device inventory and patching requirements. AllUniversity-owned laptop and tablet PC computers must be joined to the Boise State networkdomain for security and compliance requirements. User may reference the laptop and tablet PCencryption security guidelines at: ategory/system-security-encryption-guideline.3.2.7 SupportThe Office of Information Technology will only support and patch current licensed andsupported versions of software and operating systems. Software or operating systems no longersupported by the vendor must be upgraded to the most current supported version.3.2.8 Device DisposalUpon completion of a device's useful lifespan, all hard drives and electronic storage devices willbe erased using either DOD (Department of Defense) zero fill standards, magnetron, or devicedestruction. Hardware will be disposed of in accordance with Boise State and State of Idahopolicy and procedures.3.3 Backupsa. Backups are an important part of computing and the following information is to remindusers of that as they acquire new computing resources. Lost or corrupted data means the reentering of data and/or the possibility of data that can never be recovered.b. Responsibility for all data stored on local drives belongs to the assigned user of thecomputer. All files created or revised each day should be backed up if those files are storedon a local drive. Users should also ensure weekly backups of all files.c. Mission-critical data must be stored on University network file servers or approved cloudstorage vendors where backups are performed automatically.Page 4 of 5

University Policy 8030Desktop, Laptop, and Tablet PC Computing Standards4. Related InformationDesktop and Software omputers/standardsRequest for IT Security Policy/Standards r-it-security-policy-standards-exceptionSystem Security Encryption lineRevision HistoryApril 1998; March 2000; July 2001; December 2005; October 2006; January 2020Page 5 of 5

Anti-virus software is required for all laptop and tablet PC devices. Desktop Configuration Management software is required an all University-owned laptops and tablet PCs to facilitate University device inventory and patching requirements. All University-owned laptop and tablet PC computers must be joined to the Boise State network

Related Documents:

Difference between laptop and desktop LAPTOP MANUFACTURING COMPANIES 7. Operating System review &laptop uses & laptop booting p 8. Guide to purchase of second hand laptop TOOLS AND TESTING EQUIPMENTS 1. LAPTOP HARDWARE TOOLS . Bios settings & bios booting process 4. Configuring for phoenix bios 5. Bios soft ware manufacturing companies

Laptop & Desktop Assembling and disassembling GFX to NON-GFX Conversion All types of Problems Solution for Laptop & Desktop Latest Generation Motherboard Repairing Tricks Hidden Trick of Laptop & Desktop Repairing Signal, Data, Frequency & Clock Level Training Dead Laptop & Desktop Repairing

Laptop must not be stored in lockers overnight. Do not leave your laptop unsupervised outside of the classroom. Do not leave the laptop on the ground. If you lose your laptop, you must report this to TechZone immediately. If the laptop cannot be located quickly after a search of the area an email will be sent to the relevant staff and parents .

Desktop Application A desktop application is a standalone piece of software which runs in desktop or laptop. These desktop applications are developed in languages like VB, C#, java etc. Desktop applications are popular among user due to the following benefits: Applications are available offline. Application has faster response.

The XO laptop combines many technology innovations and is often called the " 100 laptop" because of its target price. We will call it by its project logo name, the XO laptop, because its price may vary from its 100 target. The goals of the XO laptop's hardware design were that it be affordable, rugged and resistant to moisture and dust for

Accessing Desktop Anywhere for Windows If the Desktop Anywhere client is installed, and you log in to Desktop Anywhere, you'll be prompted to run the Desktop Anywhere client. Dependent on the web browser you are using you will need click to run Desktop Anywhere in one of the following ways Chrome Click Open Secure G Desktop Client

HP 17g Laptop PC Model numbers: 17-br100 - 17-br199 HP 17q Laptop PC Model numbers: 17-bu100 - 17-bu199 Processors 8th generation Intel Core processors Intel Core i5-8250U (1.6-GHz, turbo up to 3.4 GHz, 6-MB L3 cache, 2400-MHz, quad, 15W) .

Nama Mata Kuliah : Akuntansi Keuangan Lanjutan Kode Mata Kuliah : AKM 145001 Semester : 5 (lima) Sks/jam perminggu : 3 SKS/ 6 jam Jurusan/ Program Studi : Jurusan Akuntansi/ DIV Akuntansi Manajemen Dosen Pengampu : 1. Novi Nugrahani, SE., M.Ak., Ak 2. Drs. Bambang Budi Prayitno, M.Si., Ak 3. Marlina Magdalena, S.Pd. MSA Capaian Pembelajaran Lulusan yang dibebankan pada mata kuliah :Setelah .