- Policies and Procedures – Frequently Asked Questions
- Copyright Act: Notice And Notice Regime
- Data Classification and Handling Standards
- Policies and Procedures
Q: Which policies apply to my area?
A: University Policies are approved by Senior Management Committee (SMC). SMC policies apply to ALL faculties and departments, university wide. ITS Policies apply to services administered by ITS and anyone using those services.
Q: Can I purchase computer hardware from any vendor I choose?
A: The Desktop and Laptop Computer Equipment Policy states that “all desktop and laptop computer equipment purchased with operating
funds must be purchased from the preferred vendor and equipment list”. A list of vendors is on Procurement Services site. This is an SMC policy and applies to all areas of the university.
Q: We found a great online service that we want to use, can we sign up right away?
A: Because online services present a unique set of risks to the entire university, well beyond your own faculty or department, the Cloud Computing policy states that “Data Protection Risk Assessments must be performed prior to the exchange of information and awarding of a contract. Assessments are conducted by the ITS Security Governance team and the University’s Privacy Office.” Additionally, contract language will be reviewed by the university’s legal counsel to understand the risks and potential exposure the service may present to the university. This is an SMC policy and applies to all areas of the university.
On January 2, 2015, the Notice and Notice regime of the Copyright Modernization Act came into force. The goal of the Notice and Notice regime is to discourage online copyright infringement.
All members of the Carleton University community have a responsibility to protect the confidentiality, integrity, and availability of data and information generated, accessed, modified, transmitted, stored or used by the University, irrespective of the medium on which the data resides and regardless of format; e.g., electronic, paper or other.
- Acceptable Use Policy for Information Technology
- Access to Information and Privacy
- Acquisition of Wireless Cellular Services Policy
- Anti-Spam Compliance
- Cloud Computing Security
- Data and Information Classification and Protection
- Desktop and Laptop Computer Equipment
- Email (Electronic Mail) Use
- Information Security Incident Response
- Information Security Policy
- Information Technology (IT) Security
- Mobile Technology Security
- Password Policy for Information Systems
- Remote Network Access
- Telecommunications Cabling and Wiring
- Web Content
*** For a complete list of university policies, visit the University Secretariat website.
- Banner Change Management
- Cardholder Data Network
- ITS Account Management
- ITS Change Management
- CUNET Domain Membership and Access Policy
- Data Backup and Restore
- Data Centre Access
- Domain Name Services (DNS)
- Internet Bandwidth Management
- Network Services
- Radio Frequency Interference
- Signing Authority (ITS)
- Voice Services
- Vulnerability Management
- Wireless Network Operations