Skip to main content

Acceptable Uses of IT Infrastructure and Resources Policy Statement

6. Implementation Information and Revision History

Implementation Information

Review Frequency:
Annual
Responsible Person:
CISO
Approved By:
Office of Legal Counsel
Approval Date:
February 14, 2018

Revision History

Version:
Date:
Description:
1.0
12/04/2004
Initial Acceptable Use Policy, which includes Applicability, User Responsibilities, and Statement of Prohibited Uses, Enforcement, and Sanctions for Non-Compliance, Privacy, and Emergencies Sections. Additionally, added as addendums policies for Anti-Spam, Email, Peer-to-Peer, Web Hosting, and Wireless Policies.
2.0
08/15/2008
The policy was extensively reviewed and modified by the Office of Legal Counsel. The following changes were made:
  1. General addition of terms, modification of language, and reorganization of sections and sub-sections to the entire IT Policy;
  2. Addition of “User Names” and “Passwords” sub-sections to “User Responsibilities and Statement of Prohibited Uses” section;
  3. Addition of “Intellectual Property” section;
  4. Addition of sub-sections and reorganization of former “Enforcement and Sanctions for Non-Compliance” and “Emergencies” sections, now, collectively, the “Monitoring, Reporting, Violations, and Sanctions” section;
  5. Addition of the “Amendments and Revisions” section in its prior format; and
  6. Addition of the “Internet Usage Policy” as an addendum.
2.1
11/11/2008
This revision includes:
  1. Changes in the password section because of the deployment of AccessIT ID,
  2. A change in Section 5, sub-section B, “Reporting,” which moved the reporting of an incident that involves a student in the Graduate School of Arts and Sciences to the Academic Dean of the school instead of the Dean of Students,
  3. Grammatical corrections throughout multiple sections of this document.
2.2
09/28/2010
This revision includes:
Modifications to the Peer to Peer Policy to meet the requirements of the Higher Education Opportunity Act of 2008.
2.3
09/26/2013
This revision includes:
Addition of the password change policy of 180 days.
2.4
08/19/2016
This revision includes:
  1. Addition of Section XIII Core Google Apps Policy
  2. Addition of Section XIV Non-core Google Apps Policy
  3. Minor grammatical changes
2.5
12/14/2016
This revision includes:
Modifications to the Peer-to-Peer Policy that reflect new restrictions on peer-to-peer file-sharing that are effective as of January 4, 2017.
3.0
12/20/2017
The policy has been renamed from IT Acceptable Use to Acceptable Uses of IT Infrastructure and Resources. In a joint effort between the Office of Legal Counsel and Fordham IT, major revisions have occurred. These revisions include:
  • The reformatting of the policy into the Fordham IT template for policies so that all policies are consistent.
  • The removal of sections from this policy. These sections will now be contained in their own standalone policies. The sections removed are as follows:
    • Anti-Spam
    • Email
    • Peer-to-Peer
    • Hosting
    • Wireless
    • Internet Usage
    • Core Google Services
    • Non-Core Google Services
  • Placement of the IT Policy Statement, Applicability, and Related Policies sections of the old policies into the appropriate areas of the IT Policy Template.
  • Elimination of the Current Revision section as that is incorporated in this table.
  • Streamlining of the Password section
  • Modernization of the Intellectual Property section
  • Rewrite of the Privacy section to reflect changes in privacy regulations that the University is required to adhere to.
  • Updates to the Reporting section.
3.1
02/14/2018
Intellectual Property (Section 2) now includes a pointer to the University’s Intellectual Property Policy on the Fordham Web Site.
4.0
07/15/2020
Updated links, removed redundant statements, update terms with current language usage