
Information Technology
You are here
IT Policies & Security
Accounts & Eligibility Requirements
- Account Creation - process for new and returning users
- Frequently Asked Questions - common questions about Butler computing accounts
- Eligibility Requirements - types of accounts and how to obtain one
- Graduate Access - what to expect once you graduate from Butler
- Disabled Accounts - process of disabling accounts and important considerations
University Computing Policies
- Computer Use Master Policy - Master policy for computer use at Butler
- Privacy Statement - Outlines policies regarding the collecting of personal information
- Copyright Policy - Policies regarding the use of copyrighted materials
- Identity Theft Information Policy - Storage, disposal, breach, and red flags. See Identity Theft Prevention Tips.
- Fair, Responsible and Acceptable Computer Use Policy - Outlines what constitutes fair and acceptable use of computer technologies at Butler
- Privacy of Personally Created Content Policy - User privacy and protecting Butler
- Employee Code of Responsibility for Security and Confidentiality of Information - Safeguarding the privacy and confidentiality of instructional information
- Document Retention Policy and Schedule - Policy on retention of University documentation
Related Usage Standards and Resources
- Smartphone and Non-standard Hardware Support - Support standards for devices like iPads & Android phones
- Learning Management System Policy and Procedures
- Blogging Standards - Standards for maintaining blogs hosted by Butler
- Computer Support Standards - Levels of computer support
- Document Hardware Management Standards - Standards for management of document production assets (printers, copiers, scanners, etc.)
- Computer Lab Usage Guidelines - Computer lab uses and restrictions
- Wireless Access Point Standards - Standards on interfering with the wireless network
- Security Standards - Standards for securing devices used to access the Butler network
- Copyright Center - Visit Butler's Copyright Center for help understanding copyright
Information Security
- Work from Home Security FAQs - for faculty and staff working remotely
- Two-Factor Authentication Policy - requirements for accessing systems
- Safe Computing - Tips and tricks to stay safe online
- Windows Security - Windows firewall, Windows update, unwanted mail, antivirus, etc.
- Mac Security - Mac firewall, antivirus, software update, etc.
- Unwanted Mail - Getting unsolicited email? Here are some tips to prevent that activity