In general, users must choose either a laptop or a desktop. Laptops may be equipped with a docking station or port replicator such that they may be connected to a full size monitor, keyboard, and other peripherals (replicator, monitor, keyboard, mouse, etc. are to be provided by the department or office of the laptop caretaker). Faculty or staff who are assigned laptops are required to keep them on campus while at work. Because of the need for specialized equipment or software, laptops may not be adequate or cost effective for some users. In these instances, users will continue to be assigned desktops.
Laptop Security Policy
Laptop computers provide important functionality, allowing University faculty and staff to have computing resources available in meetings or classes, during travel on University business, and for those who occasionally work from home. With this convenience comes additional responsibility. Laptops present an increased level of risk to both the user and to the institution. In requesting and accepting a laptop from the University, users are acknowledging their acceptance of this risk and agree to make every attempt to follow the steps outlined below to reduce it.
This policy applies to all faculty and staff who use a University-owned laptop. These individuals are hereinafter referred to as "caretakers." Each caretaker of a University-owned laptop is responsible for the security of that laptop and the data contained therein, regardless of whether the laptop is used in an office, at one's place of residence, or in any other location such as a hotel, conference room, car or airport.
All laptops should be protected with “hard” passwords. Confidential or “covered” information stored in files on the laptop should be individually pass-worded with secure “hard” passwords that are different from the laptop access passwords. Users who do not follow these guidelines are putting the institution at risk and may also be personally liable for any disclosure of covered information.
When you receive a laptop, you accept personal responsibility for safeguarding it and the data it contains.
Please observe the following guidelines:
Offices or departments will be required to share in the cost of a lost or stolen laptop. Since most laptops are leased, there is a financial commitment that must be covered. Please do not request laptops if your office or department cannot assist in covering the cost of lost equipment.
Users are encouraged to check their home insurance policies regarding coverage. The University will evaluate the circumstances of the theft or loss on a case-by-case basis to determine if individual reimbursement will be required.
To ensure that virus protection and other security patches are current, laptops must be connected to the campus network at least once every two weeks. Users who are off-campus for more than two weeks must contact the ITS Help Desk before reconnecting their laptops to the campus network. In the case of a significant security alert, users may be contacted by e-mail and/or voicemail, to bring in their laptops to the helpdesk to ensure proper security is enabled on the laptop.
ITS support of University-owned laptops will be equivalent to that provided for University-owned desktop computers. Direct support will only be provided while laptops are on campus.
Users will need their own ISP accounts if they wish to connect to the Internet from home, and may install any drivers or other software required by their ISP for remote connectivity. Users who will be accessing private, covered information (see Covered Data Security Policy) must use a VPN client to connect to University computer resources.
Because laptops are provided for University-related work, personal software should be installed very cautiously. If personal software is installed and the laptop comes to ITS for servicing, the laptop will be returned to its original configuration. Personal software or data will not be recovered.
New to AU >