Skip to main content

Changes to Spring Academic Calendar Fordham is modifying its academic calendar in anticipation of a national resurgence of the COVID-19 pandemic this winter. Full Details

Hosting Policy

Version 2.0

Purpose

The purpose of this policy is to define the permission regarding the hosting and sharing of content on the University’s IT Resources by Users or authorized third parties representing themselves as part of the University community.

Scope

This IT policy, and all policies referenced herein, shall apply to all members of the University community including faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.

Policy Statement

  • Hosting sites that represent the University, and registered student organizations (e.g., professional associations, consortiums, or journals) are permitted to share content on behalf of the University with authorization.
  • Users may share content on non-University servers. However, an authorized contractual relationship for hosting the entity’s site must be demonstrated.
  • When sharing content, all are required to respect the rights of others.
  • All are prohibited from using IT Resources to post or transmit any content that is deemed contrary to the mission of the University.

Definitions

Hosting is providing network access to a site, or network-accessible location, which includes distribution of content.

IT Resources include computing, networking, communications, application, and telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.

Related Policies and Procedures

Implementation Information

Review Frequency: Annual
Responsible Person: Director, IT Risk and Data Integrity
Approved By: Office of Legal Counsel
Approval Date: May 13, 2019

Revision History

Version: Date: Description:
1.0   While this policy is “new,” this policy was formerly in the IT Policy: Acceptable Uses of IT Infrastructure and Resources. Prior revisions to this policy found in that document.
1.1 05/13/2019 Updated policy statement
2.0 05/22/2020 Renamed policy, updated purpose and policy statements

Policy Disclaimer Statement

Deviations from policies, procedures, or guidelines published and approved by the University Information Security Office (UISO) may only be done cooperatively between the UISO and the requesting entity with sufficient time to allow for appropriate risk analysis, documentation, and possible presentation to authorized University representatives. Failure to adhere to UISO written policies may be met with University sanctions.