Forms

Campus-Wide

Internal IT


Policies

As a member of the Elon community, you should be aware of and abide by the technology policies below. Please direct any questions regarding the policies to Christopher Waters.

  • Acceptable Usage
    Explains what constitutes appropriate and acceptable use of Elon’s technology resources and services by students, faculty, and staff, helping protect the university and its users.
  • Access Control
    Defines how access rights are assigned and managed to ensure only authorized individuals can use sensitive systems and data.
  • Account Management
    Describes the lifecycle of user accounts at Elon, including how they are created, maintained, and terminated securely.
  • Computer Lab
    Outlines expectations and rules for the use of university computer labs and shared technology spaces.
  • Computer Acquisition and Disposal
    Provides guidelines for purchasing, allocating, and securely disposing of computers and related equipment.
  • E-Commerce
    Establishes rules and safeguards for conducting online financial transactions and handling payment information.
  • Electronic Communication
    Clarifies standards for responsible use of email and other electronic messaging tools provided by Elon.
  • Information Security
    Summarizes the university’s approach to protecting technology systems and sensitive information from threats.
  • Maker Hub
    Explains acceptable conduct and safety expectations when using maker space resources and equipment.
  • Moodle Course Creation
    Guides how courses should be structured in Moodle to support learning goals and consistent course quality.
  • Moodle Data Retention
    Defines how long educational and course data are retained in Moodle and why retention matters for compliance and continuity.
  • Zoom Data Retention Policy
    Clarifies how long Zoom meeting and recording data are stored and the purpose of managing retention for privacy and storage efficiency.

Standards

  • Change Management
    Establishes a consistent process for requesting, evaluating, and implementing changes to IT systems to minimize risk and service disruption.
  • Client/Server/Tablet/Mobile Device Software
    Specifies required software configurations and supported applications to ensure security, compatibility, and supportability.
  • Electronic File/Data Storage
    Provides expectations for where and how university data should be stored to ensure availability, security, and compliance.
  • Firewall Configuration Requirements and Standards
    Defines required settings and protections for firewall systems to safeguard network traffic and prevent unauthorized access.
  • Maker Hub
    Details technical and safety standards for integrating devices and systems within the Maker Hub environment.
  • Network Connection
    Sets baseline requirements for devices to connect to Elon’s network, including authentication, security, and performance criteria.
  • Network Server
    Specifies configuration and security expectations for servers supporting university services and data.
  • Passwords
    Describes requirements for password complexity, management, and best practices to protect accounts and systems.
  • Payment Card Industry Data Security
    Ensures compliance with industry standards for protecting cardholder data and securing payment processing environments.
  • SSL Certificate Service
    Defines expectations for securing web services using SSL/TLS certificates to protect data in transit.
  • Supported & Non-supported Information Based Technology
    Clarifies what technology is supported by campus IT and what falls outside standard support, helping users know where to get help.
  • Web Server & Web Application
    Specifies minimum security and operational standards for hosting and maintaining web servers and applications.

Plans