Kansas State University

search

IT News

IT Policy Update

The Division of Information Technology continues to review and update IT policies in PPM Chapter 3400. The process is outlined in KB 14656, The Division of Information Technology (IT) Policy Review Process.

The following policies have been updated or retired.

Updated Policies

  • PPM 3420 Information Technology Usage Policy: Statements regarding downloading of unauthorized software and compliance with federal legislation (FERPA, DMCA, and Gramm Leach Bliley) were added, including:
    • Not install or use peer-to-peer software or software commonly used for unauthorized acquisition or distribution of copyrighted or licensed material on university computers or those attached to the university network.
    • Be in accordance with state and federal laws (including FERPA, Gramm Leach Bliley Act, DMCA (Digital Millennium Copyright Act), US copyright laws, and policies regarding the protection of data).
  • PPM 3480 Wireless Network Policy: Changes include updating the title, cleaning up terminology, and adding a statement and definition regarding the IoT (Internet of things) and a statement about accommodating needs.

Retired Policies

  • PPM 3415 Gramm Leach Bliley Compliance Plan: The policy was more process and procedural. The procedure to comply with Gramm Leach Bliley was moved to a knowledge base article. Statements regarding Gramm Leach Bliley have been included in the PPM 3420 Information Technology Usage policy and are proposed for an updated PPM 3455 Electronic Mail.
  • PPM 3434 Security Incident Reporting and Response Policy: This policy was more procedural regarding the process for incident reporting. In addition, a comprehensive plan/procedure for managing security incidents has been updated (requires an eID/password).
  • PPM 3437 Memorandum of Agreement: This policy was more procedural regarding access to data and no longer followed. A procedure for accessing data is being updated.
  • PPM 3490 Peer to Peer: This policy focused on the procedure for handling violations of the Digital Millenium Copyright Act (DMCA). University information regarding DMCA is available here. The process for handling violations has been moved to a knowledge base article. In addition, a statement prohibiting the use of unauthorized software has been added to the PPM 3420 Information Technology Usage policy.

Share this post: