Forms

¾Ã¾ÃÈÈ-Wide

Internal IT


Policies

As a member of the Elon community, you should be aware of and abide by the technology policies below. Please direct any questions regarding the policies toÌýChristopher Waters.

  • Acceptable Usage
    Explains what constitutes appropriate and acceptable use of Elon’s technology resources and services by students, faculty, and staff, helping protect the university and its users.
  • Access Control
    Defines how access rights are assigned and managed to ensure only authorized individuals can use sensitive systems and data.
  • Account Management
    Describes the lifecycle of user accounts at Elon, including how they are created, maintained, and terminated securely.
  • Computer Lab
    Outlines expectations and rules for the use of university computer labs and shared technology spaces.

  • Provides guidelines for purchasing, allocating, and securely disposing of computers and related equipment.

  • Establishes rules and safeguards for conducting online financial transactions and handling payment information.
  • Electronic Communication
    Clarifies standards for responsible use of email and other electronic messaging tools provided by Elon.
  • Information Security
    Summarizes the university’s approach to protecting technology systems and sensitive information from threats.

  • Explains acceptable conduct and safety expectations when using maker space resources and equipment.

  • Guides how courses should be structured in Moodle to support learning goals and consistent course quality.

  • Defines how long educational and course data are retained in Moodle and why retention matters for compliance and continuity.

  • Clarifies how long Zoom meeting and recording data are stored and the purpose of managing retention for privacy and storage efficiency.

Standards

  • Change Management
    Establishes a consistent process for requesting, evaluating, and implementing changes to IT systems to minimize risk and service disruption.

  • Specifies required software configurations and supported applications to ensure security, compatibility, and supportability.

  • Provides expectations for where and how university data should be stored to ensure availability, security, and compliance.

  • Defines required settings and protections for firewall systems to safeguard network traffic and prevent unauthorized access.
  • Maker Hub
    Details technical and safety standards for integrating devices and systems within the Maker Hub environment.
  • Network Connection
    Sets baseline requirements for devices to connect to Elon’s network, including authentication, security, and performance criteria.
  • Network Server
    Specifies configuration and security expectations for servers supporting university services and data.
  • Passwords
    Describes requirements for password complexity, management, and best practices to protect accounts and systems.

  • Ensures compliance with industry standards for protecting cardholder data and securing payment processing environments.
  • SSL Certificate Service
    Defines expectations for securing web services using SSL/TLS certificates to protect data in transit.
  • Supported & Non-supported Information Based Technology
    Clarifies what technology is supported by campus IT and what falls outside standard support, helping users know where to get help.
  • Web Server & Web Application
    Specifies minimum security and operational standards for hosting and maintaining web servers and applications.

Plans