Information Resources and Technology Procedure
|Section||Policy Name||Policy Number|
|Workstation and Mobile Computing Device||System Registration||7.02.02|
This procedure documents how to properly register computer systems on the University network.
7.02 Workstation Data Security
Computers are placed in the appropriate security zone of the network via the system registration process. Computer systems should be registered on the network by authorized individuals only. The person responsible for a University system should register the system in the appropriate security (firewall) zone. For instance, an employee should not register a system on the inside (working) zone that will be located in a public area and utilized by non-employees. An employee may, however, register such a system in the appropriate lower security zone.
Individuals such as lab supervisors who routinely register multiple systems should keep a record of those systems in the event re-registration and/or registration updates are necessary.
This procedure applies to all University owned computer workstations and mobile computing devices.
|Date Approved||Revision 1 Date||Revision 2 Date||Revision 3 Date||Revision 4 Date||Revision 5 Date|