DCSIMG

Information Privacy Policy

Authentication Security

Any users of Centenary owned equipment or systems must abide by the password complexity requirements set by the IT department. Users must not:

  • Share personal computer or network credentials
  • Post usernames and passwords in a visible location
  • Attempt to disable or bypass the computer password lock policy

Password Guidelines & Requirements

Every student, staff, and faculty member is given a network login that provides access to the Centenary College network and many College systems and applications.  The assigned user of a network login will be held responsible for any and all unauthorized, criminal, or mischievous activity associated with the network login. 

Password guidelines:

  • Passwords cannot not be shared
  • Passwords cannot be written down and posted where others can see or discover the password
  • Passwords must be kept confidential

 Passwords complexity requirements:

  • Must be at least 6 characters
  • Must contain at least one capital letter (A-Z)
  • Must contain at least one lowercase letter (a-z)
  • Must contain at least one number (0-9)
  • Must contain at least one special character ((;:'"/?-_=+[{]}\|>!@#$%^&*`~,<.>;:'"/?-_=+[{]}\|)

Information Security

The main responsibility for securing sensitive data falls on the owner of that data. Always abide by the following: 

  •  Never store confidential data on an external storage device (thumb drive, CD, etc.) without first speaking with the IT department about how to properly secure it
  • It is recommended that confidential data be stored on a network drive rather than on a personal computer

Information Privacy

Centenary College values privacy and recognizes its importance in an academic setting.  However, circumstances arise which outweigh the value of a user's expectation of privacy and warrant college's access to relevant IT systems without the consent of the user.

Conditions

In accordance with state and federal law, the college may access all aspects of IT Systems, without the consent of the User, in the following circumstances:

  • To identify or diagnose systems or security vulnerabilities and problems, or otherwise preserve the integrity of IT systems.
  • When required or permitted by federal, state or local law, or administrative rules.
  • When there are reasonable grounds to believe that a violation of law or a significant breach of College policy may have taken place and access and inspection or monitoring may produce evidence related to the misconduct.
  • When it is required to carry out essential business functions of the college.
  • When it is required to preserve public health and safety or to protect the college from liability.

 Information Confidentiality

Employees must respect the confidentiality of the private information of others.  Except in cases in which explicit authorization has been granted by company management, employees are prohibited from engaging in, or attempting to engage in the following:

  • Monitoring or intercepting files or electronic communications of other employees or third parties.
  • Hacking or obtaining access to systems or accounts they are not authorized to use.
  • Utilizing the personal authentication credentials of another person.
  • Breaching, testing, or monitoring computer or network security measures.
  • Using electronic media, devices, or services that are may cause network congestion or inhibit the ability of others to access and use the network and its resources.

Anyone obtaining access to information belonging to another individual or organization must respect all copyrights, personal rights, and compliance policies of that data. Any data may not be copied, modified, or forwarded to another party unless permitted by the owner.

 Violations

 If a violation of this policy occurs, Centenary College may enforce one or more of the following:

  • Suspend, limit, or block access to college networks or systems
  • Enforce disciplinary action up to and including termination or expulsion 
  • Refer suspected violators to the appropriate law enforcement agencies
Appropriate Communication Methods

E2 campus announcement

my.centenary announcement

www page announcement

Email all faculty/staff

Email select group of students

Email all students

Alumni Activity

*

*

Athletics News/Announcements

*

*

*

Campus Announcement

*

*

*

*

Campus Closing

*

*

*

Campus Event

*

*

*

College Emergency

*

*

*

*

*

*

Facilities Announcement

*

*

*

HR Announcement

*

*

IT Announcement

*

*

*

Personal Announcement

President's Office Announcement

*

*

*

*

*

Public Relations Announcement

*

*

*

Radio Station Promotion

*

*

Registrar Announcement

*

*

Student Activity Announcement

*

*

Student Billing Announcement

*

*

Theater Promotion

*

*