Information about the ITS Department's policy, procedures, standards & SLAs.
This IT policy (the “Policy”) established a framework for all information technology (IT) policies, operating procedures, and standards at Fleming College.
The purpose of this Policy is to set out the roles & responsibilities of the College Community regarding information technology policies and standards. It also establishes the requirement for an information security management system (ISMS) and alignment of College IT policy and standards with fit-for-purpose industry frameworks.
Computers and other information technology (IT) resources are essential tools in accomplishing the College's mission. The College’s IT Resources are valuable assets to be used and managed responsibly to ensure their security, integrity, and availability for appropriate use in legitimate academic, administrative and research activities. Members of the College Community are granted access to these resources in support of accomplishing the College’s mission.
This policy (the “Policy”) provides Fleming College with direction on the management of Information Technology (IT) user accounts to ensure individuals have the appropriate access to systems, software, and information to fulfil their role, while also ensuring that the College’s information systems are appropriately protected and used.
This policy (the “Policy”) provides Fleming College with direction on the confidentiality and integrity of the College’s electronic information assets and records. Fleming College collects, creates, and maintains information to operate the College, and is required to manage that information in a responsible manner through data governance practices and controls.
This policy (the “Policy”) describes how the College will take the necessary steps to prepare for a disaster that impacts the business continuity of the College as supported by the College’s information technology (IT) resources and services.
As required under Policy 6-600, IT Policy Framework, the CIO has published IT Standards that govern the use and protection of College data and computing resources.
This procedure defines the actions and responsibilities of the College users when a request is made to access another users’ account data.
Remote network access is provided for Fleming College employees who find themselves working from a remote location, such as home or when on-call. This access can also be provided to consultants or contractors with the sponsorship of a Fleming College Employee. While the technology used follows industry best practice, remote access is inherently a security risk and must be controlled to ensure the confidentiality, integrity and availability of College systems and information. Consequently, standa
The purpose of the procedure is to provide guidance for appropriate employee use of social media. This procedure is designed to ensure that any and all interactions on behalf of Fleming College (the College) social media accounts represent the College’s best interests by providing employees with a clear understanding of how current laws and College policies apply to social media.
Fleming College collects, creates, and maintains information resources to operate the College and is required to handle that information responsibly through controls and data governance practices. This procedure provides direction on handling electronic information with direction on creating, collecting, classifying, labelling, securing, storing, using, copying, transferring, and disposing of information.
Information is a valuable asset and access to it must be managed with care to ensure that confidentiality, integrity, and availability are maintained. This procedure outlines the rules relating to authorizing, monitoring, and controlling access to Fleming accounts, information and information systems.
Compromises in information security can potentially occur at every level of computing from an individual's desktop computer to the largest and best-protected systems at the College. Incidents can be accidental or deliberate attempts to break into systems; purpose or consequence can be from benign to malicious. Regardless, each incident requires a careful response, at a level commensurate with its potential to cause harm to an individual and the College.
The purpose of this procedure is to ensure that, in the event of a disaster, the College has appropriate and efficient plans in place to address business continuity. The objective is to ensure the timely recovery and return to service of all business-critical IT resources.
This Service Level Agreement (SLA) covers the provision of multi-media classroom and lab support for timetabled activity, Monday to Friday.
All Fleming users are responsible for maintaining the security of their Fleming user account(s). The primary method of doing so is to ensure that you have a strong and unique password known only to you.
Encryption is the process of making information unreadable to protect it from unauthorized access. After information has been encrypted, a secret key or password is needed to unencrypt it and make it readable again.
All Fleming College electronic information that is electronically or physically transmitted is at risk of being intercepted and copied by unauthorized parties. Users of Fleming systems have a responsibility to protect this information, according to its classification level and safeguards described in the College’s Information Security Classification Operating Procedure (OP #6- 604A)
Fleming students and staff often study and work using personal computing devices belonging to the individual, not the college. This practice is commonly known as Bring Your Own Device (BYOD). his standard defines the responsibilities and expectations of Fleming users when studying or working from a personal BYOD device, both on and off campus.