Kansas State University

search

IT News

Category: Policy and procedures

K-State shred day November 19

Shred Day is scheduled 8:30–11 a.m. Friday, November 19, to properly dispose of university paper records on the Manhattan campus. Please review the university retention schedule to ensure accuracy in sending records for destruction. Further policy information governing records management includes the university’s records retention policy, PPM Chapter 3090.

Continue reading “K-State shred day November 19”

Reminder: Retention schedule for Zoom recordings goes into effect July 5

Beginning Monday, July 5, all Zoom recordings older than 180 days will be automatically moved to Zoom Trash. Going forward, all Zoom cloud recordings will be deleted from Zoom cloud storage 180 days from the date of creation. These recordings will be moved to the Zoom Trash folder and available for 30 additional days for recovery before permanent deletion.

Recordings that need to be kept beyond 180 days should be downloaded from Zoom and stored on your own local storage or in a different cloud location such as YouTube, OneDrive, or Mediasite. Zoom recordings created using the ‘Record on this computer’ option are stored locally on your computer and are exempt from the 180-day retention policy. Continue reading “Reminder: Retention schedule for Zoom recordings goes into effect July 5”

IT Policy Update

The Division of Information Technology continues to review and update IT policies in PPM Chapter 3400. The process is outlined in KB 14656, The Division of Information Technology (IT) Policy Review Process.

The following policies have been updated or retired.

Updated Policies

  • PPM 3420 Information Technology Usage Policy: Statements regarding downloading of unauthorized software and compliance with federal legislation (FERPA, DMCA, and Gramm Leach Bliley) were added, including:
    • Not install or use peer-to-peer software or software commonly used for unauthorized acquisition or distribution of copyrighted or licensed material on university computers or those attached to the university network.
    • Be in accordance with state and federal laws (including FERPA, Gramm Leach Bliley Act, DMCA (Digital Millennium Copyright Act), US copyright laws, and policies regarding the protection of data).
  • PPM 3480 Wireless Network Policy: Changes include updating the title, cleaning up terminology, and adding a statement and definition regarding the IoT (Internet of things) and a statement about accommodating needs.

Retired Policies

Continue reading “IT Policy Update”

Reminder: retention schedule for Zoom recordings goes into effect July 5

Beginning Monday, July 5, all Zoom recordings older than 180 days will be automatically moved to Zoom Trash. Going forward, all Zoom cloud recordings will be deleted from Zoom cloud storage 180 days from the date of creation. These recordings will be moved to the Zoom Trash folder and available for 30 additional days for recovery before permanent deletion.

Recordings that need to be kept beyond 180 days should be downloaded from Zoom and stored on your own local storage or in a different cloud location such as YouTube, OneDrive, or Mediasite. Zoom recordings created using the ‘Record on this computer’ option are stored locally on your computer and are exempt from the 180-day retention policy. Continue reading “Reminder: retention schedule for Zoom recordings goes into effect July 5”

Division of Information Technology updated policies

The Division of Information Technology embarked on a review of IT policies (PPM 3310 and those in PPM Chapter 3400) in June of 2020. The review process includes:

  • research on similar policies from peer institutions
  • review of federal and state regulations
  • inclusion of updated standards since the policy was created or revised
  • moving procedures and operational information to knowledge base articles or web pages
  • edits by a policy review team
  • consultation with specific groups across campus, which varies with each policy, and
  • consultation with the Office of General Counsel

Suggestions were incorporated into the appropriate policies, reviewed by an extended leadership group with representation from across campus, approved by the CIO, and then edited and published in the PPM. The policy review process is outlined in KB 14656, The Division of Information Technology (IT) Policy Review Process. Continue reading “Division of Information Technology updated policies”

Retention schedule for Zoom recordings goes into effect July 5

Beginning Monday, July 5, all Zoom recordings older than 180 days (Jan. 4, 2021, or older) will be automatically moved to Zoom Trash. Going forward, all Zoom cloud recordings will be deleted from Zoom cloud storage 180 days from the date of creation. These recordings will be moved to the Zoom Trash folder and available for 30 additional days for recovery before permanent deletion.

Recordings that need to be kept beyond 180 days should be downloaded from Zoom and stored on your own local storage or in a different cloud location such as YouTube, OneDrive, or Mediasite. Zoom recordings created using the ‘Record on this computer’ option are stored locally on your computer and are exempt from the 180-day retention policy. Continue reading “Retention schedule for Zoom recordings goes into effect July 5”

PPM 3091: Use of university mobile devices, personal devices, and accounts policy published

""This article for Records and Information Management Month (RIM) will focus on the new PPM 3091: Use of University Mobile Devices, Personal Devices, and Account Policy.

Mobile computing is an increasing part of everyday life; as devices become ubiquitous and more powerful, the complexity of tasks achieved away from the office on mobile devices grows. As the capabilities increase, so does the need to adhere to security protocols. Continue reading “PPM 3091: Use of university mobile devices, personal devices, and accounts policy published”

Malware filtering applied to email attachments

Office 365 and Outlook logosIn an ongoing effort to keep K-State’s systems and services safe, malware filtering has been activated for K-State’s email. The filter protects the mail system and individual mailboxes from malicious software by blocking attachments that are commonly used to transmit viruses or malicious software.

The malware filtering is applied to all K-State email: Office 365 webmail and Outlook. All incoming and outgoing email is filtered. Go to File Attachment Types Blocked By K-State Email to view a complete listing of the filetypes currently being blocked, along with common file extensions for the specific filetypes. Continue reading “Malware filtering applied to email attachments”

Updated ITS Change Management Process

by Information Technology Services

The overall goal of the Change Management Process within Information Technology Services (ITS) is to align changes to the academic and business environment, while minimizing impact and reducing the risk of unintended service disruptions.

Recently the ITS Change Management Process has been updated, allowing ITS to reduce disruptions and increase transparency of the changes that occur in our IT environments, e.g., webmail, KSIS, HRIS, and network changes.

There are three types of changes identified by ITS:

  • Standard – A routine, low-risk change that is operational in nature and happens frequently.
  • Emergency – A change required to prevent an impending Critical Incident or resolve an active Critical Incident.
  • Non-Standard – Any other change that does not fit the Standard Change or Emergency Change model.

ITS will use maintenance windows (a designated period of time) to perform changes and maintenance to our services. The default maintenance windows are listed below. Other maintenance windows are allowed as long as ITS and service owners agree on dates and times that changes can be made.

“Although it sounds easy, tracking changes and the process surrounding it can be quite complex. ITS has invested significant time into laying out this new process so it is easy to follow and adopt in the hopes that we get a better picture of changes that are happening in our critical environments,” said Greg Dressman, director of Enterprise Server Technologies and Change Manager.

“When things go wrong we need to quickly understand what changed so we can focus on restoring services in the fastest way possible. This process also brings our proposed changes out into the open so we can discuss them in terms of risk, reward, timing, and appropriate customer communication before they go into place.”

If you have questions about the ITS Change Management Process, email Greg Dressman, dressman@k-state.edu.

LISTSERV policy change goes into effect Oct. 2

by Information Technology ServicesStop Spam image

Currently, emails from K-State LISTSERV mailing lists bypass Spam check procedures. Beginning Monday, Oct. 2, LISTSERV emails will go through the same Spam check-in Office 365 along with the rest of our university emails. Information Technology Services (ITS) will only bypass emails from the spam checks if a reasonable case can be made for the need. The goal is to reduce K‑State’s exposure to spam and allow the spam protections in Office 365 to do their job.

You should periodically check your Junk Email folder to make sure
you are not losing important, safe emails. After Oct. 2, be sure to

look for messages from your LISTSERV lists in your Junk Email folder. If you find any, fill out this form to request a global settings change that will move those emails from your Junk Email folder into your Inbox folder instead. Requests will be considered on a case-by-case basis for approval.

If you have questions, contact Greg Dressman, director of Enterprise Server Technologies, dressman@ksu.edu.