EmployEE Handbook - Marymount University
EmployEE Handbook - Marymount University
EmployEE Handbook - Marymount University
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Marymount</strong> <strong>University</strong> also maintains computerized data on students, personnel, and<br />
financial records that are integral to the administration of the <strong>University</strong>. The <strong>University</strong><br />
has the responsibility to manage these data and to provide the security necessary for<br />
their use.<br />
Access<br />
Users will be assigned a <strong>Marymount</strong> <strong>University</strong> computer account to access <strong>Marymount</strong><br />
<strong>University</strong> computer facilities. The <strong>University</strong> reserves the right to access individual<br />
accounts and the system at any time at its sole discretion.<br />
A password will allow access to an employee’s account. It is the employee’s<br />
responsibility to protect his or her account from unauthorized use by changing passwords<br />
periodically and by using passwords that are not easily guessed.<br />
Employees should identify themselves clearly and accurately in electronic<br />
communications. Concealing or misrepresenting a name or affiliation is a serious abuse.<br />
Using identities of other individuals constitutes fraud.<br />
Access to administrative data repositories will be granted to authorized <strong>University</strong><br />
employees who require it in the performance of their jobs. This shall include staff in<br />
administrative offices whose job function requires use of the data, the vice presidents,<br />
deans, department chairpersons, program directors and authorized designees within<br />
these units.<br />
Requests for administrative access must be made on the Request for User Account Form,<br />
and must be approved by the Vice President or the Vice President’s designee of the<br />
person requesting access. The form should be forwarded to the Security Administrator in<br />
the Office of Administrative Information Services for processing. Upon receipt of proper<br />
authorization, the Security Administrator will assign a User ID and password.<br />
Requests to view data elements that are considered restrictive in nature by the <strong>University</strong><br />
must be approved by the division Vice President.<br />
Responsibility of Every User<br />
General Use Responsibilities<br />
• Employees should accept responsibility for their own work by learning<br />
appropriate uses of software to maintain the integrity of what they create.<br />
Employees should keep archives and backup copies of important work; learn<br />
and properly use the features for securing or sharing access to files on any<br />
computers they use.<br />
• Any attempt to circumvent system security, guess other passwords, or in any<br />
way gain unauthorized access to local or network resources is forbidden.<br />
Distributing passwords or otherwise attempting to evade, disable or “crack”<br />
passwords or other security provisions threatens the work of many others<br />
and is therefore grounds for immediate suspension of privileges and could<br />
lead to additional disciplinary action, up to and including termination of<br />
38