Information about the ITS Department's policy, procedures, standards & SLAs.

Articles (18)

6-600 IT Policy Framework

This IT policy (the “Policy”) established a framework for all information technology (IT) policies, operating procedures, and standards at Fleming College. 

The purpose of this Policy is to set out the roles & responsibilities of the College Community regarding information technology policies and standards. It also establishes the requirement for an information security management system (ISMS) and alignment of College IT policy and standards with fit-for-purpose industry frameworks.

6-601 Appropriate Use Policy (AUP)

Computers and other information technology (IT) resources are essential tools in accomplishing the College's mission. The College’s IT Resources are valuable assets to be used and managed responsibly to ensure their security, integrity, and availability for appropriate use in legitimate academic, administrative and research activities. Members of the College Community are granted access to these resources in support of accomplishing the College’s mission.

6-602 IT User Account Management Policy

This policy (the “Policy”) provides Fleming College with direction on the management of Information Technology (IT) user accounts to ensure individuals have the appropriate access to systems, software, and information to fulfil their role, while also ensuring that the College’s information systems are appropriately protected and used.

6-604 Electronic Information Security Policy

This policy (the “Policy”) provides Fleming College with direction on the confidentiality and integrity of the College’s electronic information assets and records. Fleming College collects, creates, and maintains information to operate the College, and is required to manage that information in a responsible manner through data governance practices and controls.

6-605 IT Business Continuity Policy

This policy (the “Policy”) describes how the College will take the necessary steps to prepare for a disaster that impacts the business continuity of the College as supported by the College’s information technology (IT) resources and services.

IT Standards

As required under Policy 6-600, IT Policy Framework, the CIO has published IT Standards that govern the use and protection of College data and computing resources.

OP #6-601 AUP and Accessing Another User’s Data Procedure

This procedure defines the actions and responsibilities of the College users when a request is made to access another users’ account data.

OP #6-601A Remote Access Procedure

Remote network access is provided for Fleming College employees who find themselves working from a remote location, such as home or when on-call. This access can also be provided to consultants or contractors with the sponsorship of a Fleming College Employee. While the technology used follows industry best practice, remote access is inherently a security risk and must be controlled to ensure the confidentiality, integrity and availability of College systems and information. Consequently, standa

OP #6-601B Social Media Procedure

The purpose of the procedure is to provide guidance for appropriate employee use of social media. This procedure is designed to ensure that any and all interactions on behalf of Fleming College (the College) social media accounts represent the College’s best interests by providing employees with a clear understanding of how current laws and College policies apply to social media.

OP #6-604A Information Security Classification Procedure

Fleming College collects, creates, and maintains information resources to operate the College and is required to handle that information responsibly through controls and data governance practices. This procedure provides direction on handling electronic information with direction on creating, collecting, classifying, labelling, securing, storing, using, copying, transferring, and disposing of information.

OP #6-604B Access Control Procedure

Information is a valuable asset and access to it must be managed with care to ensure that confidentiality, integrity, and availability are maintained. This procedure outlines the rules relating to authorizing, monitoring, and controlling access to Fleming accounts, information and information systems.

OP #6-604C Information Security Incident Management

Compromises in information security can potentially occur at every level of computing from an individual's desktop computer to the largest and best-protected systems at the College. Incidents can be accidental or deliberate attempts to break into systems; purpose or consequence can be from benign to malicious. Regardless, each incident requires a careful response, at a level commensurate with its potential to cause harm to an individual and the College.

OP #6-605A IT Business Continuity and Disaster Recovery

The purpose of this procedure is to ensure that, in the event of a disaster, the College has appropriate and efficient plans in place to address business continuity. The objective is to ensure the timely recovery and return to service of all business-critical IT resources.

Service Level Agreement (SLA) #2 Multi-media Classroom and Lab Support

This Service Level Agreement (SLA) covers the provision of multi-media classroom and lab support for timetabled activity, Monday to Friday.

US-101 – Password and Passphrase Protection Standard

All Fleming users are responsible for maintaining the security of their Fleming user account(s). The primary method of doing so is to ensure that you have a strong and unique password known only to you.

US-102 - Encryption Requirements

Encryption is the process of making information unreadable to protect it from unauthorized access. After information has been encrypted, a secret key or password is needed to unencrypt it and make it readable again.

US-103 – Transmission and Sharing of Electronic Information

All Fleming College electronic information that is electronically or physically transmitted is at risk of being intercepted and copied by unauthorized parties. Users of Fleming systems have a responsibility to protect this information, according to its classification level and safeguards described in the College’s Information Security Classification Operating Procedure (OP #6- 604A)

US-107 – Bring Your Own Device (BYOD)

Fleming students and staff often study and work using personal computing devices belonging to the individual, not the college. This practice is commonly known as Bring Your Own Device (BYOD). his standard defines the responsibilities and expectations of Fleming users when studying or working from a personal BYOD device, both on and off campus.