Technology and Software Usage
Policy #04.71.11
6
desktop, portable, laptop, and mobile computing devices such as smart phones
and tablets, and all other electronic devices which connect to the university’s
networks.
d. IP Address
A group of numbers that is used to uniquely identify a computer or other
hardware connected to the university network.
e. Privileged Access
An authorized user who has been granted rights or powers, typically reserved
for the system administrator, on a computer system.
f. Shared or Generic Account
An account that is used by more than one individual to access a technology
resource.
g. System Administrator
An individual who has been assigned the responsibility of administering and
managing a computer application or server that performs functions beyond
normal desktop or personal computing tasks. Systems administered by a
system administrator usually support multiple users and administrators
typically have privileged access.
h. Technology Resources
Any one or more of the following in which the university has an ownership,
lease, license, proprietary, managerial, administrative, maintenance or other
legal or equitable interest: computers, devices, electronic communications
systems, university network, data storage media, systems, terminals, printers,
software, files, documentation, accounts, and any other hardware, software,
information, or other technology attached or connected to, installed in, or
otherwise used in connection or associated with any of the foregoing. The use
of a device or other equipment that is not technology resources (e.g., a
personally owned computer) in conjunction with technology resources (e.g.,
the university network) shall constitute the use of technology resources and
shall be governed by this Technology and Software Usage policy (policy
04.71.11)
i. University Network
All components that may be used to effect operation of university computer
networks, including, without limitation, routers, switches, firewalls,
computers, copper and fiber cabling, wireless communications and links,
equipment closets and enclosures and other facilities, network electronics,
telephone lines, modems, and other peripherals and equipment, data storage
media, devices and systems, and software.