9.5.5 Information Technology
Information Technology Resources
All University employees are provided with the necessary information technology resources (computing, networking, phones, etc.) to efficiently and effectively perform their job duties as well as support University business and its mission of education, research and service. Information on available information technology services and support can be found at www.mtu.edu/it.
Information Technology help is available from the IT-Help Desk at phone number (906) 487-1111, through email at email@example.com, and the Library and IT Service Center in the J. R. Van Pelt and Opie Library.
Procurement of University IT resources and services is centrally managed by the Office of Information Technology. All IT related purchases must be made following the Procurement of Information Technology Equipment, Software, & Consumables procedure regardless of the source of funding per policy 2.2014 Information Technology Procurement.
Faculty and staff have access to many different types of software on campus. For a listing of software available visit www.mtu.edu/it.
The computer lab image remains the same from year to year, with some updates to versions. Requests for new software should be emailed to firstname.lastname@example.org at least a semester prior to use.
If new software is requested that you would ask IT to fund, there is a process for requesting IT-Funded Software.
Information Security and Compliance
As stated within the University's Information Security Compliance Policy, Michigan Tech has an obligation to comply with state and federal laws, regulations, policies, and standards associated with information security to preserve the confidentiality, integrity, and availability of information assets owned or entrusted by the University.
Access to information technology resources owned or operated by Michigan Tech imposes certain responsibilities and obligations. As stated within the University Information Technology Acceptable Use Policy, Michigan Tech considers access to information technology resources to be a privilege that is granted on the condition that each member of the University community respects the integrity of computing resources and facilities, respects the rights of other users, and complies with all relevant state and federal laws, University policies and procedures, as well as contractual agreements.
The use of any wireless device that causes interference with the University's wireless network is strictly prohibited. This applies to the entire campus; all departments in all academic buildings, administrative buildings, residence halls and auxiliary buildings, including those not on the main campus.
Security of Confidential Information
Faculty and staff members routinely have access to highly sensitive and confidential information such as, student grades, financial aid amounts, performance evaluations, family data, and medical records. University employees are responsible for maintaining the confidentiality and security of the data with which they work with and for keeping data secure and accessible only to those who have rights to this information. Due to the sensitive nature of information that is accessible to personnel, all must meet the highest standards possible for managing the University's information in a secure and professional manner.
Annual Information Compliance Survey and Security Awareness Training
An annual survey is conducted to determine the type of information employee's access as part of their job responsibilities. The survey also identifies how the information is obtained, processed, transmitted, and disposed of.
The survey results determine what type of training employees need and employees are required to complete annual training. Security awareness training is an important part of Michigan Tech's overall IT security and compliance initiatives. It is an ongoing process of educating the University community on potential risks and security concerns as well as good information security practices both at home and at work.
02/23/2017 - Annual Review: To reflect current language, changed "Faculty and staff have access to many different types of software on our campus. For a listing of software available and for information about its use and restrictions please visit www.it.mtu.edu.During the spring semester Information Technology publishes a questionnaire to faculty and teaching staff requesting information on what software is needed in the undergraduate and graduate computing labs and remote access terminal servers for the start of the fall semester. This process mimics the selection of textbooks in importance and timeline. The process needs to be completed during spring term to be ready for fall semester. Late software requests will be handled to the best of our ability but may be delayed in their deployment. Requests for software outside of the fall software questionnaire can be directed to Information Technology by emailing email@example.com or calling 906-487-1111." to ""
12/08/2016 - Annual Review: No changes made to content.
02/25/2015 - Annual Review: To reflect current practice, the email address for questions is now firstname.lastname@example.org. No changes made to content. 04/30/14 - Annual Review: Added new paragraphs: IT Procurement and Software and moved Information Security and Compliance before Acceptable Use and Security of Confidential Information. Under Information Security and Compliance, deleted "Information security policies and procedures allow the University to satisfy its legal and ethical responsibilities with regard to IT resources and can be found at http://www.security.mtu.edu/policies-procedures/index.php." Under Acceptable Use, deleted "Employees are responsible for adhering to Michigan Tech's information technology policies." Added the second paragraph which reads: "The use of any wireless device that causes interference with the University's wireless network is strictly prohibited. This applies to the entire campus; all departments in all academic buildings, administrative buildings, residence halls and auxiliary buildings, including those not on the main campus." Under Security of Confidential Information, deleted "For full text please see the University's Confidentiality Agreement." Added "Annual Information Compliance Survey and Security Awareness Training" sections.
02/26/2014 - Annual Review: Updated Michigan Tech and Handbook banners. Section "9.5.4 Information Technology" was renumbered to read "9.5.5 Information Technology".
03/28/2013 - Annual Review: Web address changed for Confidentiality Agreement - no content changes made.
07/20/2011 - Annual Review: Was previously 9.6.4. Deleted paragraphs describing IT services and included link to web page which describes available services; included Acceptable Use, Security of Confidential Information, and Information Security and Compliance sections; and to reflect current University titles and practice, MTU is now Michigan Tech and the email address for questions is now hbwebmaster.