Acceptable Use of Computing Resources Policy
Account Management Policy
Appropriate Use of Computer and Network Resources Policy
Client Use Administrative Rights Policy (Faculty)
Data Classification Standards
Digital Millennium Copyright Act
Email Accounts Policy
Guidelines for Artificial Intelligence (AI)
Mobile Device Acceptable Use Policy
Privacy Policy
Record Retention and Destruction Policy
Records Retention Schedule, Policy Proposal
Responsible Use of Computing Policy
Security Incident Response Framework (External) Policy
Social Media Policy
Video Guidelines and Policies
Web Development and Publishing Policies
Web Accessibility Standards
Wireless and Network Policy
Guidelines
Guidelines are supporting documentation to policies, standards, and procedures. They provide extra, recommended guidance for meeting policies and standards.
Procedures
Procedures explain how to do the standards. They support policies and standards by establishing the proper steps to take.
Standards
Standards explain what needs to happen to follow policies. They support policies by assigning specific measures and actions.
Policies
Policies set the foundation for the entire policy base. They identify why we need to do something. They identify the issue and the scope.
Summary with Links
Acceptable Use of Computing Resources Policy
This policy outlines acceptable use of Grand Canyon University’s computing resources. It neither reduces nor expands existing acceptable-use policies, but merely clarifies and illustrates the sorts of behaviors that may result in a response by the university or other interested parties. While staff members do not provide legal advice, they can help you review technical issues and explain what is generally considered to be acceptable or unacceptable behavior. View the policy.
Account Management Policy
The purpose of this policy is to establish a standard for the administration of computing accounts that facilitate access or changes to Grand Canyon University information resources. An account, at minimum, consists of a user ID and a password. Supplying account information will usually grant access to some set of services and resources. This policy establishes guidelines for issuing and managing accounts. View the policy
Appropriate Use of Computer and Network Resources Policy
The information systems of GCU are intended for the use of authorized members of the community in the conduct of their academic and administrative work. GCU’s information systems consist of all networking, computing and telecommunications wiring, equipment, networks, security devices, passwords, servers, computer systems, computers, computer laboratory equipment, workstations, Internet connection(s), cable television plant, university-owned mobile communications devices and all other intermediary equipment, services and facilities. These assets are the property of the university. This Policy describes the terms and conditions of use for GCU information systems. View the Policy
Client Use Administrative Rights Policy (Faculty)
Maintaining the highest level of security for our campus computing environment and University data is a responsibility shared by the campus community. This policy establishes a baseline of client requirements towards achieving a secure environment. View the Policy
Data Classification Standards
One of the most difficult parts of working with data is knowing the restrictions on that data. When classifying restricted data, certain terms are used to describe when and how information can be shared. The GCU Data Classification Standard covers GCU’s Institutional Information and IT Resources. This Standard does not apply to Individually-Owned Data, which is defined as an individual’s own personal information that is not considered Institutional Information. View the Data Classification Standards.
Digital Millennium Copyright Act (DCMA) Policy
The Digital Millennium Copyright Act, enacted in 1998, is an amendment that attempts to update the Copyright Act so that it accounts for copyright in the digital age. The DMCA helps to protect the internet provider and hold the user liable for infringement when it occurs. As long as the internet provider follows the information below, it won’t be liable for any infringement. View the policy.
Email Accounts Policy
The purpose of this policy is to ensure that Grand Canyon University’s electronic mail (e-mail) services remain available to and reliable for the University community, and are used for purposes appropriate to the University’s mission. View the Policy
Guidlines for Artificial Intelligence (AI)
GCU stresses the importance of an individual’s direct involvement and commitment to their academic development. AI should be used to complement, rather than substitute the intellectual investments necessary for achieving meaningful educational outcomes and future career skills. View the Policy
Mobile Device Acceptable Use Policy
This University Mobile Device Acceptable Use Policy applies to use of Grand Canyon University assigned mobile services, and University owned and/or issued mobile devices. These are referred to in this document as in either of two ways.
Definitions:
- Mobile device: any electronic device with the ability to transmit or receive data, text, and/or voice, via a University-approved cellular network. This includes but is not limited to smartphones, cellular equipped tablets, laptops, and wi-fi cellular cards.
- Communication device: Includes all mobile (cellular) devices as defined above as well as other communications devices including, but not limited to land line telephones, two- way radios, and beepers.
View the Policy
Privacy Policy
Grand Canyon University (GCU) is located in Phoenix, AZ. The university, a top Christian institution serving both traditional and online students, is committed to protecting our constituents’ privacy. This statement is designed to expound upon the necessary collection of data/information that GCU acquires from site visitors and to define how that information is used. View the Policy
Record Retention and Destruction Policy
The purpose of this policy is to provide standards for the retention and destruction of Grand Canyon University records, the process for destroying records that have reached the end of their mandatory retention period or that are no longer necessary for business operations, to designate the appropriate person responsible for retention and destruction, and the method for preserving records. Additional policies or regulations may be applicable to the particular record and should be consulted. View the Policy
Records Retention Schedule, Policy Proposal
Knowing what records to keep and for how long is challenging. A records retention schedule defines the period of time that records should be retained and when they should be destroyed. Various requirements based in law and university policy govern the retention of administrative records. A retention schedule is critical for promoting responsible records management, mitigating risk, and ensuring consistent compliance across GCU. View the Policy Proposal
Responsible Use of Computing Policy
All information, records and material maintained on the University’s computers and computing systems by University employees is the property of the University. Notwithstanding the above principle, the University acknowledges that faculty members may have an expectation, consistent with general practice in American higher education and any applicable collective bargaining agreement, of a proprietary interest in their scholarly and research materials, similar to the same interest they would have in handwritten materials produced within the scope of their employment.
This policy outlines the standards for acceptable use of University computing and information technology resources, which include, but are not limited to, equipment, software, networks, data and telephones, whether owned, leased or otherwise provided by Grand Canyon University. View the Policy
Security Incident Response Framework (External) Policy
It is the responsibility of the entire University community to respond in a consistent manner, with appropriate leadership and technical resources, to any security incident. The Grand Canyon University IT Service Desk and Office of Information Security are available to facilitate and provide guidance with any computer security incidents that affect University IT resources or threatens the availability, confidentiality, and integrity of university information.
Security incidents involving restricted personally identifiable information (PII) or confidential information as defined by the Data Classification and Handling Policy must be reported immediately to the Office of Information Security ([email protected])
Social Media Policy
Grand Canyon University recognizes and supports the principles of academic freedom and the First Amendment rights of employees and students to speak on matters of public concern as private citizens through social media. This Policy is intended, in a manner consistent with those principles and rights, to set forth the University’s expectations and employee and student responsibilities in regard to the use of existing and emerging social media communication technologies. View the policy.
Security Standards
Compliance with GCU’s Minimum Security Standards for Networked Devices (MSSND) helps protect not only the individual device but also other devices connected through GCU’s network and Cloud Services. The standard is intended to prevent exploitation of Campus resources by unauthorized individuals, including the use of Campus resources to attack other systems on the GCU network, IT Resources, or the Internet. View the standards.
Video Publishing Guidelines and Policies
Video production is often complex and time-consuming, but a great video can elevate and articulate the distinctive qualities of the GCU brand. Consider these guidelines when creating video. View the guidelines.
Web Development and Publishing Policy
Grand Canyon University’s Campus Technology (CT) has adopted a web application development platform consisting of specific operating systems, web servers, databases, and programming tools that can be used to host web applications developed in-house or by outside contractors. The purpose of this document is to define the components of the University’s supported web development platform, coding standards, and testing and approval process so that applications can be developed in a manner consistent with accepted interoperability and security practices and be fully compatible and supportable in our environment. View the policy.
Grand Canyon University’s web presence is essential to its mission of teaching, learning, and public service. However, any information published to a web server can potentially be viewed, copied, and redistributed by anyone who can access it via a web browser. Thus, the University’s Web Publishing policy seeks to establish standards and guidelines. View the policy.
Web Accessibility Standards
In order to assure that websites and web applications are accessible to and usable by everyone, designers and developers must follow web accessibility guidelines. View the standards.
Wireless Network Policy
A wireless network device is any computer, laptop, gaming console (Xbox, PlayStation, etc.) or other device that connects to the GCU wireless network to access the internet. View the policy.