Members of the campus community need to use shared resources in a manner that is legal, ethical, and respectful of others. View policy.
From time to time it becomes necessary for an official of the College to gain access to electronic information that is normally not available to the general public. This policy describes the procedures that are to be followed when access to such information is needed. View policy.
Vassar’s position on the issue of peer-to-peer (p2p) file sharing, and the procedures that are in place for responding to requests from copyright holders or their official designees. View policy.
Some members of the Vassar College community are known by a name that is different from their legal name. View policy.
This policy is designed to regulate access to Vassar’s systems and information assets yet preserve the fundamental information security principles of confidentiality, data and system integrity, availability, accountability and assurance. The policy outlines requirements and best practices for the protection of Vassar’s resources. View policy.
Passwords are an important part of Vassar’s efforts to protect its technology systems and information assets by ensuring that only approved individuals can access these systems and assets. Advances in Information Security research has led to the development of new best practices for the composition, lifetime and general usage of passwords. This policy is designed to adopt these practices to enhance the security of the Vassar community. View policy.
This policy provides the overall Vassar College Information Security framework addressing key initiatives to provide for the confidentiality, integrity and availability of Vassar College’s information assets. View policy.
This policy defines the data classification requirements for information assets in order to ensure that data is secured and handled according to its sensitivity and impact that theft, corruption, loss or exposure would have on the institution. View policy.
This plan offers guidelines and procedures for those who collect, process, or store data, in addition to those who are requesting new access to data for any of those purposes. View plan.