Search4 Results
- Knowledge Base
- Information Technology
- IT Policy, Procedures, Standards & SLAs
Fleming students and staff often study and work using personal computing devices belonging to the individual, not the college. This practice is commonly known as Bring Your Own Device (BYOD). his standard defines the responsibilities and expectations of Fleming users when studying or working from a personal BYOD device, both on and off campus.
- Knowledge Base
- Information Technology
- IT Policy, Procedures, Standards & SLAs
All Fleming College electronic information that is electronically or physically transmitted is at risk of being intercepted and copied by unauthorized parties. Users of Fleming systems have a responsibility to protect this information, according to its classification level and safeguards described in the College’s Information Security Classification Operating Procedure (OP #6- 604A)
- Knowledge Base
- Information Technology
- IT Policy, Procedures, Standards & SLAs
Encryption is the process of making information unreadable to protect it from unauthorized access. After information has been encrypted, a secret key or password is needed to unencrypt it and make it readable again.
- Knowledge Base
- Information Technology
- IT Policy, Procedures, Standards & SLAs
All Fleming users are responsible for maintaining the security of their Fleming user account(s). The primary method of doing so is to ensure that you have a strong and unique password known only to you.