Policies & Forms
Forms
¾Ã¾ÃÈÈ-Wide
Internal IT
Policies
As a member of the Elon community, you should be aware of and abide by the technology policies below. Please direct any questions regarding the policies toÌýChristopher Waters.
- Acceptable Usage
Explains what constitutes appropriate and acceptable use of Elon’s technology resources and services by students, faculty, and staff, helping protect the university and its users. - Access Control
Defines how access rights are assigned and managed to ensure only authorized individuals can use sensitive systems and data. - Account Management
Describes the lifecycle of user accounts at Elon, including how they are created, maintained, and terminated securely. - Computer Lab
Outlines expectations and rules for the use of university computer labs and shared technology spaces.
Provides guidelines for purchasing, allocating, and securely disposing of computers and related equipment.
Establishes rules and safeguards for conducting online financial transactions and handling payment information.- Electronic Communication
Clarifies standards for responsible use of email and other electronic messaging tools provided by Elon. - Information Security
Summarizes the university’s approach to protecting technology systems and sensitive information from threats.
Explains acceptable conduct and safety expectations when using maker space resources and equipment.
Guides how courses should be structured in Moodle to support learning goals and consistent course quality.
Defines how long educational and course data are retained in Moodle and why retention matters for compliance and continuity.
Clarifies how long Zoom meeting and recording data are stored and the purpose of managing retention for privacy and storage efficiency.
Standards
- Change Management
Establishes a consistent process for requesting, evaluating, and implementing changes to IT systems to minimize risk and service disruption.
Specifies required software configurations and supported applications to ensure security, compatibility, and supportability.
Provides expectations for where and how university data should be stored to ensure availability, security, and compliance.
Defines required settings and protections for firewall systems to safeguard network traffic and prevent unauthorized access.- Maker Hub
Details technical and safety standards for integrating devices and systems within the Maker Hub environment. - Network Connection
Sets baseline requirements for devices to connect to Elon’s network, including authentication, security, and performance criteria. - Network Server
Specifies configuration and security expectations for servers supporting university services and data. - Passwords
Describes requirements for password complexity, management, and best practices to protect accounts and systems.
Ensures compliance with industry standards for protecting cardholder data and securing payment processing environments.- SSL Certificate Service
Defines expectations for securing web services using SSL/TLS certificates to protect data in transit. - Supported & Non-supported Information Based Technology
Clarifies what technology is supported by campus IT and what falls outside standard support, helping users know where to get help. - Web Server & Web Application
Specifies minimum security and operational standards for hosting and maintaining web servers and applications.