Policies & Forms
Forms
Campus-Wide
- Mobile Phone Acquisition Request and Usage
- IT Projects Request Form
- Enterprise Solutions Request Form
- Parental Consent Form
Internal IT
Policies
As a member of the Elon community, you should be aware of and abide by the technology policies below. Please direct any questions regarding the policies to Christopher Waters.
- Acceptable Usage
Explains what constitutes appropriate and acceptable use of Elon’s technology resources and services by students, faculty, and staff, helping protect the university and its users. - Access Control
Defines how access rights are assigned and managed to ensure only authorized individuals can use sensitive systems and data. - Account Management
Describes the lifecycle of user accounts at Elon, including how they are created, maintained, and terminated securely. - Computer Lab
Outlines expectations and rules for the use of university computer labs and shared technology spaces. - Computer Acquisition and Disposal
Provides guidelines for purchasing, allocating, and securely disposing of computers and related equipment. - E-Commerce
Establishes rules and safeguards for conducting online financial transactions and handling payment information. - Electronic Communication
Clarifies standards for responsible use of email and other electronic messaging tools provided by Elon. - Information Security
Summarizes the university’s approach to protecting technology systems and sensitive information from threats. - Maker Hub
Explains acceptable conduct and safety expectations when using maker space resources and equipment. - Moodle Course Creation
Guides how courses should be structured in Moodle to support learning goals and consistent course quality. - Moodle Data Retention
Defines how long educational and course data are retained in Moodle and why retention matters for compliance and continuity. - Zoom Data Retention Policy
Clarifies how long Zoom meeting and recording data are stored and the purpose of managing retention for privacy and storage efficiency.
Standards
- Change Management
Establishes a consistent process for requesting, evaluating, and implementing changes to IT systems to minimize risk and service disruption. - Client/Server/Tablet/Mobile Device Software
Specifies required software configurations and supported applications to ensure security, compatibility, and supportability. - Electronic File/Data Storage
Provides expectations for where and how university data should be stored to ensure availability, security, and compliance. - Firewall Configuration Requirements and Standards
Defines required settings and protections for firewall systems to safeguard network traffic and prevent unauthorized access. - Maker Hub
Details technical and safety standards for integrating devices and systems within the Maker Hub environment. - Network Connection
Sets baseline requirements for devices to connect to Elon’s network, including authentication, security, and performance criteria. - Network Server
Specifies configuration and security expectations for servers supporting university services and data. - Passwords
Describes requirements for password complexity, management, and best practices to protect accounts and systems. - Payment Card Industry Data Security
Ensures compliance with industry standards for protecting cardholder data and securing payment processing environments. - SSL Certificate Service
Defines expectations for securing web services using SSL/TLS certificates to protect data in transit. - Supported & Non-supported Information Based Technology
Clarifies what technology is supported by campus IT and what falls outside standard support, helping users know where to get help. - Web Server & Web Application
Specifies minimum security and operational standards for hosting and maintaining web servers and applications.