Provisioning and Deprovisioning Policy
For Students, Faculty, Staff, Guests, Alumni
The purpose of this policy is to define the University’s IT Resources access issuance, modification, or revocation for entities affiliated with the University.
This IT policy, and all policies referenced herein, shall apply to all members of the University community, including faculty, students, administrative officials, staff, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.
- With appropriate authorization, access to University IT Resources is granted to entities (person or non-person) following the Principle of Least Privilege.
- When an entity’s (person or non-person) role or affiliation is modified or terminated, and access is no longer required to the University’s IT Resources, it is the managing supervisor's responsibility (or higher) to notify Human Resources and the IT Service Desk Level 1, as applicable, of the status change.
- All provisioning and deprovisioning requests must be kept in the University’s IT ticketing system to enable an appropriate review of compliance with this policy.
- IT Resources that do not use centrally managed services (e.g., Central Authentication Service) and automatic provisioning/deprovisioning processes must be manually provisioned/deprovisioned by the individual(s) responsible for that resource.
- Non-centrally managed accounts include but are not limited to:
- Service and administrative accounts,
- Academic Computing Environment (ACE) accounts,
- Database accounts,
- Application-based accounts, or
- Corporate and generic accounts.
Corporate accounts are departmental or group email accounts.
Deprovisioning is the term used when account access is suspended or disabled from use.
IT Resources include computing, networking, communications, application, telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.
Principle of Least Privilege (POLP) is the cybersecurity practice that individuals should have access to only IT Resources and functions required to perform their stated duties.
Provisioning is the term used for creating or providing specific account access.