Information Management & Technology
What does this procedure govern?
How can resources be used?
Who can use the computing and communication resources?
What are the penalties for abuse or violation?
What if I suspect my resources have been compromised?
What other applicable administrative policies, procedures and student code of conduct are applicable to University system users?
Privacy and Security
University Web Pages
Contact for this Page: Jennifer Rasmuson | Page Last Updated:
Affirmative Action/Equal Employment Opportunity/Title IX Policy and Coordinator