Students

Posting Policy

Title: Posting Policy
Policy Owner: Office of the Provost and Office of the Vice President for Student Life and Enrollment
Applies to: Faculty, staff, students, visitors
Campus Applicability: Storrs and regional campuses
Approval Date: June 27, 2024
Effective Date: June 28, 2024
For More Information, Contact Office of the Provost or Office of the Vice President for Student Life and Enrollment
Contact Information: provost@uconn.edu or VPSLE@uconn.edu
Official Website: https://provost.uconn.edu or https://studentlife.uconn.edu

 

PURPOSE

This Policy is intended to ensure the responsible and effective use of bulletin boards and other areas designated for the posting of Flyers, prevent littering and the defacing of or damage to University property. This Policy is not meant to supersede other existing area specific posting policies, nor is it intended to inhibit free speech or expression.  However, all Flyers must comply with established University Policies.

APPLIES TO

Storrs and Regional Campuses, not including UConn Health and UConn Law.

DEFINITIONS

Designated Posting Areas: Specific locations on campus authorized for the display of Flyers and similar materials. These areas are established to help ensure the responsible and orderly use of space for announcements and information dissemination. Designated Posting Areas are either Controlled Posting Spaces or Open Posting Spaces.

Controlled Posting Spaces: Designated posting areas managed by respective building managers and/or departmental owners. Prior approval is required to post a flyer in a controlled posting space.

Open Posting Spaces: Designated posting areas that do not require approval prior to posting.

Flyers: Posters, printed materials, and/or any other physical materials.

POLICY STATEMENT

Flyers may only be posted in Designated Posting Areas, such as bulletin boards and other designated spaces throughout the campus. Under no circumstance may Flyers be affixed in any manner on University signs, lampposts, trees, or any place that would impede ingress/egress. For safety reasons, Flyers may not be slipped under the doors of offices, classrooms, or other University spaces. Any postings in non-designated areas will be removed.

Flyers must be affixed in a manner that does not cause damage to University property. Only non-permanent methods may be used to display Flyers. Permanent or semi-permanent adhesion that may cause damage to University property must not be used. In general, only tacks on bulletin boards, and painter’s tape on non-tackable boards should be used. Individuals/organizations wishing to post Flyers should also ensure compliance with the departments/offices' policies, including those linked in the References section below.

PROCEDURES

Printed Flyers should be of a standard size (e.g. 8.5”x11”) not to exceed 11”x17”. Only one Flyer per event or notice should be posted in each Designated Posting Area. Excess Flyers and other posting materials may be removed.

Flyers should include the name of the organization/individual responsible for the posting and the date on which it was displayed.

Individuals or groups posting Flyers for events should remove them within 24 hours of the event's completion. Once the event date has passed, anyone may remove the posting.

Building managers may remove Flyers that do not have specific dated events periodically based on the date the posting is displayed (e.g. once per semester or on another schedule).

LOCATIONS

Building managers may designate Open Posting or Controlled Posting Spaces, in consultation with leadership of departments/units within the building, for the posting of Flyers that meet the standards outlined in this Policy. Classrooms are not considered Designated Posting Areas. Postings in classrooms can be used as part of instruction during class times and should be removed after the class is over.

Open Posting Spaces are areas designated for the posting of Flyers that meet the standards outlined in this Policy and do not require prior approval. Open Posting Spaces shall be clearly marked. A listing of known locations is available in the References section below.  If a space is not clearly marked as an Open Posting Space, individuals are encouraged to seek permission before posting.

Flyers must be approved prior to posting in Controlled Posting Spaces, including materials that would be placed on or in the ground in outdoor spaces. Separate posting policies, procedures or guidelines in university buildings/departments/units may have other restrictions such as size, length of posting times, and methods for affixing materials, and will follow the standards provided by this Policy.

Refer to department/unit-specific Controlled Posting Spaces guidelines prior to posting in these spaces. Flyers that have not been approved for posting in Controlled Posting Spaces may be removed. Controlled Posting Spaces shall also be clearly marked. A listing of known locations is available in the References section. Faculty office areas (e.g. doors and bulletin boards outside of their offices) and administrative spaces are at the discretion of academic departments/building managers.

In University buildings/departments/units that have separate posting policies, procedures or guidelines,  items must be posted in accordance with the standards  provided by the specific department/unit/building and this Policy.

In University buildings/departments/units that do not have a separate policy or defined Open or Controlled Spaces, postings are not allowed.

ENFORCEMENT

Violations of this policy may result in appropriate disciplinary measures in accordance with University By-Laws, General Rules of Conduct for All University Employees, applicable collective bargaining agreements, and the University of Connecticut Student Code.

Individuals and groups can be charged with violating the University Code of Conduct or the Student Code, specifically Part III, B. 17: “Damage or misuse of property, which includes, but is not limited to, attempted or actual damage to or misuse of University property or other personal or public property”.

Individuals, departments, units, student organizations, and off-campus businesses or groups that violate this Policy will be asked to remove Flyers immediately and will be billed for any damage to University property that occurs because of improper posting.

Flyers that do not meet the standards outlined in this Policy or posted in places not designated for display may be removed at any time.

Questions about this Policy may be directed to the Office of the Provost at provost@uconn.edu or the Office of the Vice President for Life and Enrollment at VPSLE@uconn.edu.

REFERENCES

The list of departments/units with specific posting policies includes but is not limited to the following:

POLICY HISTORY

Policy created:  06/27/2024 Approved by the Senior Policy Council and the President

Financial Commitments to Institutional Training Grants and Nationally Competitive Graduate Fellowships

Title: Financial Commitments to Institutional Training Grants and Nationally Competitive Graduate Fellowships
Policy Owner: Vice Provost for Graduate Education and Dean of The Graduate School
Applies to: Faculty and Graduate Students
Campus Applicability: All campuses, including master’s and PhD programs at UConn Health, and excluding the UConn School of Law
Approval Date: June 27, 2024
Effective Date: July 1, 2024
For More Information, Contact Office of the Vice Provost for Graduate Education and Dean of The Graduate School
Contact Information: (860) 486-3167
Official Website: http://grad.uconn.edu/

 

BACKGROUND

Institutional Training Grants and Nationally Competitive Fellowships provide essential financial support for graduate students, including Stipends and partial coverage of tuition and health insurance costs. The Institutional Allowance associated with these grants and fellowships for tuition and health insurance often falls short of the total cost. This gap in funding can place a financial burden on students. The University's commitment to providing additional subsidies aims to bridge this funding gap, ensuring that graduate students can pursue their studies without financial hardship.

PURPOSE

To outline the financial commitments from the University that help ensure students supported on Institutional Training Grants or Nationally Competitive Fellowships are not responsible for tuition payments to the University and that they receive a health insurance subsidy equivalent to the subsidy available to graduate students who hold graduate assistantships.

APPLIES TO

This policy applies to all graduate students supported on an Institutional Training Grant or Nationally Competitive Fellowship and to faculty teams to whom an Institutional Training Grant is awarded.

DEFINITIONS

Institutional Allowance: Funds provided by an Institutional Training Grant or Nationally Competitive Fellowship to defray a portion of the tuition for full-time enrollment and the cost of health insurance.

Institutional Training Grant: A competitively awarded grant from an external organization or agency provided to teams of faculty for the purpose of training graduate students in specific disciplines, which often complements faculty research. These grants offer important financial support for graduate students, including Stipends.

Nationally Competitive Fellowship: A fellowship available to U.S. graduate students that is awarded by a federal agency or other external organization to individual graduate students who apply and who are selected by a review panel overseen by the awarding agency or organization.

Stipend: A Stipend is an allowance provided by either an Institutional Training Grant or a Nationally Competitive Fellowship intended to support living expenses of the graduate student supported by the award.

POLICY STATEMENT

The University may provide tuition and health insurance subsidies to bridge the gap between an Institutional Allowance associated with Institutional Training Grants or Nationally Competitive Fellowships and a graduate student’s total cost of tuition and health insurance. To qualify for the tuition and health insurance subsidies available under this policy the following conditions apply:

  1. Institutional Training Grants: Students supported on the Institutional Training Grants listed below will receive subsidies for tuition and health insurance if the Vice Provost for Graduate Education and Dean of The Graduate School has approved the Institutional Allowance in the budget request associated with the grant proposal before the grant has been submitted. The faculty member or team must apply for the maximum Institutional Allowance available under the award. Graduate students supported on Institutional Training Grants not listed below may receive subsidies at the discretion of the Vice Provost for Graduate Education and Dean of The Graduate School provided the Institutional Allowance associated with the grant covers a substantial fraction of the total cost of tuition and health insurance and the faculty applied for the maximum Institutional Allowance available under the award.
    • Department of Education – Graduate Assistance in Areas of National Need
    • National Institutes of Health – Ruth L. Kirschtein Institutional Awards (T32, )
    • National Science Foundation – National Research Traineeship
    • National Institute for Occupational Safety and Health (NIOSH) – Training Grants
    • Department of Agriculture – National Needs
  1. Nationally Competitive Fellowships: Students supported on the Nationally Competitive Fellowships listed below will receive subsidies for tuition and health insurance. Students supported on other nationally competitive fellowships may receive subsidies at the discretion of the Vice Provost for Graduate Education and Dean of The Graduate School provided the fellowship offers an annual Stipend equal to or greater than Level I graduate assistantship (9-month) Stipend as well as an Institutional Allowance determined to be adequate by the VP and Dean.
    • National Defense Science & Engineering Grad Fellowships (NDSEG)
    • National Institutes of Health - Ruth L. Kirschstein Predoctoral Individual National Research Service Award (F31)
    • National Science Foundation – Graduate Research Fellowship
  1. Notification Requirement: Faculty teams leading an Institutional Training Grant and the home departments of students holding a Nationally Competitive Fellowship must notify the Vice Provost for Graduate Education and Dean of The Graduate School of all supported students at least six weeks before the beginning of each semester.
  2. Graduate Students: Graduate students receiving subsidies must register as full-time students. They are responsible for mandatory fees associated with enrollment unless the award specifically mandates that the Institutional Allowance is intended to cover fees as well as tuition. Graduate students must also pay a portion of the health insurance premium equivalent to that charged to graduate assistants in similar circumstances.

ENFORCEMENT

Violations of this policy may result in appropriate disciplinary measures in accordance with University By-Laws, General Rules of Conduct for All University Employees, applicable collective bargaining agreements, and the University of Connecticut Student Code.

POLICY HISTORY

Policy created:   06/27/2024 Approved by the Senior Policy Council and the President

Revisions:                         

Replaces:  Policy on Competitive Federal Graduate Fellowship Awards; Policy on Competitive Non-Federal Graduate Fellowship Awards

Academic, Scholarly, and Professional Integrity and Misconduct (ASPIM), Policy on

Title: Academic, Scholarly, and Professional Integrity and Misconduct (ASPIM), Policy on
Policy Owner: Graduate Faculty Council; University Senate
Applies to: All members of the University community
Campus Applicability: Storrs and Regional Campuses
Approval Date: July 11, 2023
Effective Date: August 28, 2023
For More Information, Contact: For Undergraduate Education: Director or Associate Director, Office of Community Standards (community@uconn.edu)

 

For Graduate Education: Director of Graduate Student and Postdoctoral Scholar Support, The Graduate School (gradschool@uconn.edu)

Official Website: policy.uconn.edu

BACKGROUND

The University of Connecticut is committed to fostering an intellectual community in which the highest ethical standards of academic, scholarly, and professional integrity prevail.  All members of the university community, including administrators, faculty, staff, and students, have a shared responsibility to uphold this commitment.  This commitment relates to all aspects of academic, scholarly, and professional activity, which include not only activities related to instruction, but also those related to the production and dissemination of scholarship, research, and creative works, and to professional conduct within clinical and other professional settings. Integrity in all of these activities is of paramount importance, and the University requires that the highest ethical standards in teaching, learning, research, and service be maintained. This includes “ethical aspects of scholarship that influence the next generation of researchers as teachers, mentors, supervisors, and successful stewards of grant funds” (Council of Graduate Schools, 2012).

Issues related to academic and scholarly integrity at the University of Connecticut are governed by the Academic, Scholarly, and Professional Integrity and Misconduct Policy (DATE). To recommend changes to the policy or to the implementing procedures, a committee must be convened that brings together all the above relevant stakeholders, including University Senate and Graduate Faculty Council. The committee must then bring those changes to the University Senate and Graduate Faculty Council, and each body must vote to approve any changes.

Students’ responsibilities with respect to academic and scholarly integrity are described in the following documents: Responsibility of Community Life: The Student Code.

PURPOSE

To ensure a commitment to academic, scholarly, and professional integrity in all levels of the university community.

Such a commitment ensures that:

  • all individuals accept full responsibility for their own work and ideas;
  • all academic/scholarly credit awarded to an individuals represents the work of that individual;
  • no student benefits from an unfair advantage;
  • faculty, staff, advisors and others who support the intellectual development of students are committed to fostering, guiding, and monitoring students for adherence to all principles of academic and scholarly integrity;
  • the grades earned, the degrees or certificate conferred were appropriately earned by the individual;
  • the reputation of the University with respect to academic and scholarly integrity are protected
  • faculty, staff, and students adhere to the professional standards of conduct specific to each program offered at the university;
  • this policy is used consistently across the University, including undergraduate and graduating students and schools/colleges.

APPLIES TO

This policy applies to all members of the University Community engaged in academic and scholarly efforts in, but is not limited to, the following contexts in undergraduate and graduate education:

  • courses, including online courses (e.g., assignments, exams, projects, thesis);
  • experiential and service-learning courses and activities;
  • study abroad programs;
  • clinical and practice placements, internships, and externships;
  • program assessments (e.g., comprehensive exams, thesis, program reviews);
  • research, including undergraduate, graduate, postdoctoral scholar, and faculty research; and
  • processes involving submitting information (i.e., admissions, for scholarships/fellowships, for competitions, for awards, or other university programs); and
  • professional events and conferences

All members of the University community are responsible for ensuring that the principles of academic and scholarly integrity are upheld.

This policy applies to graduate students and postdoctoral scholars, with the exception of PharmD students in the School of Pharmacy and professional students with degrees conferred by the Schools of Dental Medicine, Medicine, or Law.

This policy does not apply to legal, regulatory, or compliance requirements that fall outside the Academic and Scholarly Integrity Policy. In addition, this policy does not remove any reporting requirements to the appropriate oversight authority in instances of noncompliance or alleged noncompliance.

DEFINITIONS

Academic Integrity:  a commitment by the University Community to uphold just and ethical behaviors, which includes truthfulness, fairness, and respect (ICAI, 2021).

Scholarly Integrity: a commitment by the University community to both ”… research integrity and the ethical understanding and skill required of researchers/scholars in domestic, international, and multicultural contexts. It is also intended to address ethical aspects of scholarship that influence the next generation of researchers as teachers, mentors, supervisors, and successful stewards of grant funds.” (p. xix, Council of Graduate Schools, 2012).

Professional Integrity. Standards of behavior defined by the various professions in which students are prepared through their degree or certificate programs.

Academic, Scholarly, and Professional Integrity Misconduct is defined as unethical academic and scholarly behavior during a course (e.g., on an assignment or exam), as part of other degree requirements (e.g., requirements regarding placement, capstone or comprehensive exams, or placement exams), or at other times during undergraduate, graduate, or professional study and performance, including during engagement in fieldwork, clinical placements, or research. These behaviors include:  

  • Cheating: Unauthorized acts, actions, or behaviors in academic or scholarly areas. Examples of cheating include, but are not limited to:
    • providing or receiving help on an assignment or exam intended to reflect the individual student’s work product when not authorized to do so by the instructor. 
    • buying, selling, circulating, or using a copy of instructional materials, assignment or test, including uploading such information to online services, or using materials prepared by services that sell or provide papers or other course materials.
    • asking someone to complete an assignment, exam, or other requirement on your ones behalf or completing an assignment, exam, or requirement for another student. 
    • Failure to disclose unauthorized assistance on work submitted for evaluation, i.e., assistance obtained outside channels approved by instructors, that is used to complete a course, program, or degree requirement. This includes assistance from other students, teaching assistants, Quantitative Learning Center, Writing Center, or mediated support from the Center for Students with Disabilities.
  • Plagiarizing: Using one’s own previously published, presented, or disseminated material, or another person’s language/text, data, ideas, expressions, digital/graphic element, passages of music, mathematical proofs, scientific data, code, or other original material without authorization of the originating source or proper acknowledgement, attribution, or citation of the originating source. Examples of plagiarism include but are not limited to:
  • submitting as one’s own any work (in whole or part) completed by another individual, including any work that has been purchased from an individual, commercial research firm, or obtained from the internet.
  • submitting for evaluation or credit any work that was previously used or submitted for credit in another course or as part of a degree requirement (e.g., a thesis or dissertation) without authorization to do so from the instructor. (This includes self-plagiarism in the form of re-using, in part or whole, the content of a paper from another class or context.).
  • submitting any work prepared for or used in a previous publication, academic competition, clinic, or other activity (e.g., grant or application submission) without prior approval and full disclosure or when permitted by established editorial or other policy. (This includes self-plagiarism in the form of using, in part or whole, the content of a paper that was previously published without attribution).
  • unauthorized use of previously completed work or research for a thesis, dissertation, or publication.
  • Misrepresenting: Deliberately knowing and providing false or misleading information, including information about oneself or others. Examples of misrepresenting include but are not limited to:
    • engaging in “any omission or misrepresentation of the information necessary and sufficient to evaluate the validity and significance of research, at the level appropriate to the context in which the research is communicated” (D. Fanelli, Nature 494:149; 2013).
    • making unauthorized alterations to any document or digital file pertaining to academic or scholarly activity, including assignments, exams, and research data.
    • making up information for the purpose of deception (e.g., fabrication of data in research).
    • making false, inaccurate, or misleading claims or statements, including claims/statements made when asking for assistance (e.g., requesting an extension on an assignment), applying for admission to an undergraduate or graduate program, applying for a scholarship or an academic, scholarly, or research award, or submitting manuscripts for publications.
    • allowing someone to use one’s identity or using someone else’s identity for academic or scholarly advantage (e.g., signing in electronically for an absent student).
    • accepting credit for work for which the individual did not contribute (e.g., misrepresenting an individual’s role in a group assignments).
  • Noncompliance: Failure to conform with codified and publicly available academic, scholarly, or professional standards, processes, or protocols.Examples of noncompliance include but are not limited to:
  • not attending to the professional standards governing the professional conduct of students in particular fields (e.g., pharmacy, nursing, education, counseling, and therapy).
  • violating protocols governing the use of human or animal subjects. 
  • breaching confidentiality in academic and scholarly activity (e.g., disclosing the identity of study participants).
  • disregarding the applicable university, local, state, or federal regulations that guide academic or scholarly activities.

Instructor: any faculty, teaching assistant, or any other person (e.g., lab supervisor, clinical supervisor, professional staff) authorized by the University to provide educational services (e.g., teaching, research, advising)

POLICY STATEMENT

All members of the university community, including administrators, faculty, staff, and students, have a shared responsibility to uphold the highest ethical standards of academic, scholarly, and professional integrity and to report any violations of those standards of which they are aware.

Instructor Expectations: To foster a culture of academic integrity, instructors are responsible for communicating the expectations for academic and scholarly integrity to students and for engaging in practices that mitigate violations of this policy. Specifically, instructors are expected to:

  • include a link to the Academic, Scholarly, and Professional Integrity and Misconduct policy as part of course syllabi or documentation for any other academic/scholarly activity and include any additional unit-specific expectations.
  • review academic and scholarly integrity policy and any other disciplinary- or activity-specific expectations.
  • provide clear guidance for all assignments, activities, and assessments, including noting what resources can be used and whether collaboration is permitted.
  • ensure individuals engaged in research, creative, or professional activities understand the standards, protocols, and guidelines to which they must adhere.
  • adhere to the University processes for reporting misconduct, engaging in the review process, and assigning consequences to address violations, which should include opportunities for education and remediation.

Student Expectations:   To uphold the principle of academic and scholarly integrity in all aspects of their intellectual development and engagement at the University, students are expected to:

  • be responsible for their own work and their own actions related to all academic and scholarly endeavors.
  • assume they are to do independent work and seek clarification prior to collaborating with others or using outside resources.
  • understand and abide by the standards, protocols, and guidelines to which they must adhere in research, creative, or professional activities .

If students witness or become aware of a violation of academic or scholarly integrity, they are encouraged to communicate this to the appropriate university representative (e.g., faculty, staff, advisor).

A cumulative record is maintained of all academic or scholarly integrity violations and such record will be reviewed and considered as part of subsequent incidences. Individuals engaged in research are expected to follow all standards, rules and regulations that guide the proper conduct of research or creative activity.

ENFORCEMENT

Violations of this policy and its related procedures may result in appropriate disciplinary measures in accordance with University By-Laws, General Rules of Conduct for All University Employees, applicable collective bargaining agreements, and the University of Connecticut Student Code.

Notes:  Student misconduct is governed by the University’s Student Code, which is administered under the direction of the Division of Student Affairs. Enforcement of its provisions is the responsibility of the Director of Community Standards (for undergraduate students), The Graduate School (for graduate students), and the Office of the Vice President for Research (for research misconduct). Identified misconduct will be routed to the appropriate unit.

Faculty misconduct is also governed by the Code of Conduct and misconduct is addressed by the appropriate university administrative unit(s) (e.g., School/College, Provost Office, Office of the Vice President of Research, Human Resources).

REFERENCES

International Center for Academic Integrity [ICAI]. (2021). The Fundamental Values of Academic Integrity. (3rd ed.) https://academicintegrity.org/images/pdfs/20019_ICAI-Fundamental-Values_R12.pdf

Council of Graduate Education (2012). Research and Scholarly Integrity in Graduate Education: A Comprehensive Approach. https://cgsnet.org/research-and-scholarly-integrity-graduate-education-comprehensive-approach-2

Responsibilities of Community Life: The Student Code

PROCEDURES/FORMS

Undergraduate Education: Academic, Scholarly, and Professional Misconduct

Graduate Education: Academic, Scholarly, and Professional Misconduct

[Note: UConn will continue to use the existing procedures administered by Community Standards for undergraduate education and The Graduate School for graduate education until such time that the university transitions to the new Procedures for Addressing Alleged Violations of the Policy on Academic, Scholarly, and Professional Integrity, which was approved by Graduate Faculty Council and the University Senate.]

POLICY HISTORY

07/11/2023 Approved by the President (06/26/2023 Approved by Senior Policy Council; 05/01/2023 Approved by University Senate; 10/26/2022 Approved by Graduate Faculty Council)

Multi-Factor Authentication Policy

Title: Multi-Factor Authentication Policy
Policy Owner: Information Technology Services / Chief Information Security Officer 
Applies to: All employees, students
Campus Applicability:  All Campuses
Effective Date: March 29, 2023
For More Information, Contact UConn Information Security Office 
Contact Information: techsupport@uconn.edu or security@uconn.edu 
Official Website: https://security.uconn.edu/

PURPOSE 

To help prevent unauthorized access to University information systems.

DEFINITIONS  

DUO: A Universityapproved Multi-Factor Authentication (MFA) application That provides an added layer of protection to help prevent unauthorized access to university information systems. DUO can be loaded on individual devices including smartphones and tablets. It can also provide multi-factor authentication through the sending of SMS codes directly to phones and through the use of pre-generated codes.

Fob: A small hardware device that serves as a second authentication mechanism either in place of in addition to the DUO mobile app.

University Information System: Devices and/or components managed by the University for collecting, storing, and processing data and for providing information, knowledge, and digital products. For purposes of this policy, information technology devices and components managed exclusively by UConn Health are not considered University Information Systems.

 Multi-Factor Authentication (MFA): MFA is a method of system access control in which a user is granted access only after successfully providing at least two pieces of authentication, usually including knowledge (something the user knows such as a password), possession (something the user has such as a token generator), or inherence (something the user is such as the use of biometrics).

POLICY STATEMENT  

Users of University Information Systems must adhere to Multi-Factor Authentication requirements, where available, to ensure authorized access to University Information Systems and protected or confidential data.

PROCEDURES

User Requirements

  1. Users must maintain a device that can receive DUO authentication requests in a secure manner via the DUO mobile app or another mechanism, such as SMS, phone, or token.
  2. When an attempt is made to access a DUO enabled system or application, the system will challenge the user by requesting a second factor of authentication which may include an acknowledgement of a push notification via the DUO app, a 6-digit code via SMS, or a Fob.
  3. If users receive a DUO notification when not conducting a recent authentication, the authentication should be denied and reported to the Technology Support Center

Frequency of User Challenges

The frequency with which a user may be challenged depends both on policy and use.

  • Policy based – depending on information being accessed, more frequent authentications may be required.
  • Usage based – While user challenges may be “remembered” for a period of time, use of other hardware, browsers, or other behaviors may trigger additional verification using a second factor.

Lost or Stolen Devices

If a user’s registered device is lost, stolen, or the user has reason to suspect their UConn NetID has been compromised, the user must contact the Technology Support Center immediately. As a precaution, they should change their NetID password at netid.uconn.edu

Off-Hours and Emergency Access to systems and applications

UConn Information Technology Services will maintain internal procedures for processing emergency access requests if issues arise with the multi-factor authentication process. Users should contact the Support Desk for additional information.

Use of Automated Systems

Automated systems that intend to interfere with the approval component of multi-factor authentication are hereby prohibited.

ENFORCEMENT 

Users may not attempt to circumvent login procedures, including DUO multi-factor authentication, on any computer system or otherwise attempt to gain unauthorized access. Attempts to circumvent login procedures may subject individuals to disciplinary action. Financial losses incurred due to the use of DUO multi-factor circumvention techniques are the responsibility of the user, and the University may seek financial restitution from users who violate this policy.

Violations of this policy may result in appropriate disciplinary measures in accordance with University By-Laws, General Rules of Conduct for All University Employees, applicable collective bargaining agreements, and the Student Code.

EXCEPTIONS

ITS will review and document any requests for exceptions to this standard. ITS will also have available solutions for the intermittent failure of various second factors, which may include the allowance of temporary access codes upon verification of an individual’s identity.

Questions about this policy or suspected violations may be reported to any of the following:

Information Technology Services Tech Support –  https://techsupport.uconn.edu (860-486-4357)

Information Security Office – https://security.uconn.edu

POLICY HISTORY 

Policy created:  March 29, 2023 (Approved by Senior Policy Council)

 

 

Student Athlete Name, Image, Likeness, Policy On

Title: Student-Athlete Name, Image, and Likeness, Policy On
Policy Owner: University Athletics
Applies to: All Student-Athletes and University Employees
Campus Applicability: All Campuses
Effective Date: June 30, 2021
Last Review Date: May 2, 2022
For More Information, Contact Director of Athletics
Contact Information: (860) 486-2725
Official Website: https://uconnhuskies.com/sports/2021/7/14/uconn-nil-information

PURPOSE

To establish a policy pursuant to which University of Connecticut (“University”) student-athletes are permitted by the University to (1) earn compensation through an endorsement contract or employment in an activity unrelated to an intercollegiate athletic program; and (2) obtain legal or professional representation of an attorney or sports agent through a written agreement, provided that in each case, the student-athlete complies with the terms and conditions of this policy and applicable law.

APPLIES TO

All student-athletes and University Employees.

DEFINITIONS

Athletics booster means a person who directly contributes to a University athletic program.

Compensation means the receipt, whether directly or indirectly, of any cryptocurrency, money, goods, services, other items of value, in kind contributions and any other form of payment or remuneration.

Endorsement contract means a written agreement under which a student-athlete is employed or receives compensation for the use by another party of such student-athlete's person, name, image or likeness in the promotion of any product, service or event.

Intercollegiate athletic program means a program at the University for sports played at the collegiate level for which eligibility requirements for participation by a student-athlete are established by a national association for the promotion or regulation of college athletics.

NCAA means the National Collegiate Athletic Association or its successor.

Official team activities means all games, practices, exhibitions, scrimmages, team appearances, team photograph sessions, sports camps sponsored by the University and other team-organized activities, including, but not limited to, photograph sessions, news media interviews, and other related activities as specified by the University.

Prohibited endorsements means receipt of compensation by, or employment of, a student-athlete for use of the student-athlete's person, name, image or likeness (“NIL”) in association with any product, category of companies, brands, or types of endorsement contracts that are: (1) prohibited by law; (2) prohibited by this policy; or (3) prohibited under the applicable University procedures adopted in accordance with this policy.

Sports agent means a duly licensed person who negotiates or solicits a contract on behalf of a student-athlete in accordance with the Sports Agent Responsibility and Trust Act, 15 USC 7801, et seq., as amended from time to time.

Student-athlete means a student enrolled at the University who participates in an intercollegiate athletic program.

University marks means the name, logo, trademarks, mascot, unique colors, copyrights and other intellectual property or defining insignia of the University.

POLICY STATEMENT

The University shall permit its student-athletes to (1) earn compensation through an endorsement contract or employment in an activity unrelated to an intercollegiate athletic program and (2) obtain legal or professional representation of an attorney or sports agent through a written agreement, provided that the student-athlete complies with this policy and applicable law.

I. Agreements for Representation by a Sports Agent or an Attorney

    1. A student-athlete may only enter into an agreement for representation with a sports agent if the student-athlete submits a copy of the agreement to the University.
    2. A student-athlete may only enter into an agreement for representation with an attorney if the student-athlete submits a copy of the agreement to the University.

II. Endorsement Contracts and Agreements for Employment Activities

A student-athlete may only enter into an endorsement contract or agreement for other employment activities if:

    1. the student-athlete discloses the existence of the agreement to the University;
    2. the student-athlete submits a copy of the agreement to the University prior to the student-athlete performing any activity or service under the agreement;
    3. the agreement, or any portion thereof, does not conflict with the provisions of any agreement to which the University is a party. In the event that a potential conflict is identified, the University shall disclose to the student-athlete or the student-athlete's attorney or sports agent the provisions of the University agreement that are in conflict; and
    4. the student-athlete is not required to participate or engage in any activity prohibited by Section III of this policy.

 III. Prohibitions

    1. Student-athletes are prohibited from using or consenting to the use of any University marks when performing any services or activity associated with an endorsement contract or employment activity without prior written permission from the University or its authorized designee.[1]
    2. Student-athletes are prohibited from performing any service or activity associated with an endorsement contract or employment activity that interferes with any official team activities or academic obligations.
    3. University employees are prohibited, in their individual capacity, from entering into endorsement contracts with any student-athlete or otherwise providing compensation themselves to a student-athlete in return for NIL services.
    4. University employees, students, and athletic boosters are, to the extent required under NCAA rules, prohibited from creating or facilitating NIL compensation opportunities for prospective student-athletes as a recruiting inducement or current student-athletes as an inducement to remain enrolled at the University.
    5. Student-athletes are prohibited from receiving compensation from, entering into an endorsement contract with, and/or otherwise engaging in an employment activity with companies, brands, products, conduct, and/or entertainment prohibited under University procedures adopted in accordance with this policy.

IV. Procedures

University of Connecticut Student-Athlete’s Name, Image, and Likeness Procedures

ENFORCEMENT
Violations of this Policy or associated procedures may result in appropriate disciplinary measures in accordance with state law, University Laws and By-Laws, and Division of Athletics Student Athlete Handbook.

POLICY HISTORY

Policy created effective June 30, 2021 [Approved by the Board of Trustees]

Revisions: May 2, 2022 [Approved by President’s Senior Policy Council]

[1] In accordance with Connecticut law, the University is prohibited from providing any student with written permission until July 1, 2022.

[2] This prohibition extends to communication with family members and others affiliated with prospective students.

Mobile and Remote Device Security Policy

Title: Mobile and Remote Device Security, Information Technology 
Policy Owner: Information Technology Services / Chief Information Security Officer 
Applies to: All faculty, staff, student employees, and volunteers   
Campus Applicability: All campuses except UConn Health 
Effective Date: August 30, 2021
For More Information, Contact UConn Information Security Office 
Contact Information: techsupport@uconn.edu or security@uconn.edu 
Official Website: https://security.uconn.edu/

PURPOSE 

To ensure data and information systems security by establishing requirements for mobile and remote devices.  Mobile and remote devices are important tools for the University, and their use is supported to advance the mission of the university. Mobile and remote devices also represent a significant risk to information and data security. If appropriate security measures and procedures are not applied, mobile and remote devices can serve as a conduit for unauthorized access to University data and IT resources that can subsequently lead to data leakage and a path for compromise of other systems. 

APPLIES TO 

This policy applies to all University faculty, staff, student employees, and volunteers who use mobile or remote devices to access any non-public IT resources owned or managed by the University. 

DEFINITIONS 

IT Resources: Includes systems and equipment, software, and networks. Systems and equipment include but are not limited to computers, hard drives, printers, scanners, video and audio recorders, cameras, photocopiers, and other related devices. Software includes but is not limited to computer software, including open-source and purchased software, and all cloud-based software, including infrastructure-based cloud computing and software as a service. Networks include but are not limited to all voice, video, and data systems, including both wired and wireless network access across the institution. 

Mobile Electronic Device: Includes telecommunication and portable computing devices which can execute programs or store data, including but not limited to laptops, tablet computers, smartphones, and external storage devices. Generally, a device capable of using the services provided by a public/private cellular, wireless, or satellite network. 

Remote Device: Personal computer used off-site 

POLICY STATEMENT  

University of Connecticut faculty, staff, student employees, and volunteers who use mobile or remote devices are responsible for any institutional data that is stored, processed, and/or transmitted via a mobile or remote device and for following the security requirements set forth in this policy. 

To adequately protect the data and information systems of the University, all individuals covered under this policy are expected to meet the following requirements: 

All users of a mobile electronic device used to access non-public university systems must take the following measures to secure the device: 

  • Configure the device to require a password (minimum of 10 characters), biometric identifier, PIN (minimum of 6 characters), or swipe gesture (minimum of 6 swipes) to be entered before access to the device is granted. Device must automatically lock and require one of the authentication methods after no more than 5 minutes of idle time. 
  • Keep devices on currently supported versions of the operating system and remain current with published patches. 
  • Enable the device’s remote wipe feature to permit a lost or stolen device to be securely erased. 
  • Securely store electronic devices at all times to minimize loss via theft or accidental misplacement. 

    Wherever practical, elements of these requirements will be enforced via centrally administered technology controls.  

    STORAGE OF CONFIDENTIAL DATA 

    In general, confidential data should not be stored on mobile devices, including laptops. However, in certain instances and depending on job responsibilities, this may be unavoidable. In these instances, confidential data must be stored on university-owned devices ONLY with the following requirements: 

    • Except when being actively used, confidential information must at all times be encrypted on any device through a mechanism approved by the University. Alternatively, whole drive encryption software may be deployed to meet this requirement. 
    • Mobile devices must have university-supported software enabled and running to identify, protect, and respond to any threats to the data or operating systems of the devices. 
    • Devices must have Mobile Device Management software installed to facilitate device protection, including remote wipe and, if possible, device location technology for recovery. 

    DEVICE DECOMISSION OR SEPARATION FROM UNIVERSITY 

    When mobile devices, specifically personally owned devices that may have had access to University resources or data, are no longer used, and donated, or given to anyone, the device owner is responsible for ensuring that any University information is securely deleted from the device, including University-related e-mails/accounts, user ID and password, or other cached credentials used to access University systems. 

    In the event of separation from the University, it is the employee’s responsibility to delete any University-related e-mail accounts or University licensed software that may have been installed on personal devices or computers. 

    ENFORCEMENT 

    Violations of this policy may result in appropriate disciplinary measures in accordance with University By-Laws, General Rules of Conduct for All University Employees, applicable collective bargaining agreements, and the Student Code. 

    Questions about this policy or suspected violations may be reported to any of the following: 

    Office of University Compliance –  https://compliance.uconn.edu (860-486-2530) 

    Information Technology Services Tech Support –  https://techsupport.uconn.edu (860-486-4357) 

    Information Security Office – https://security.uconn.edu 

     

    POLICY HISTORY 

    Policy created:  August 30, 2021 [Approved by President’s Senior Team] 

    System and Application Security Policy

    Title: System and Application Security Policy 
    Policy Owner: Information Technology Services / Chief Information Security Officer 
    Applies to: All students, faculty, and staff  
    Campus Applicability: All campuses except UConn Health 
    Approval Date: August 30, 2023
    Effective Date: August 31, 2023
    For More Information, Contact: UConn Information Security Office 
    Contact Information: techsupport@uconn.edu or security@uconn.edu
    Official Website: https://security.uconn.edu/

    PURPOSE 

    To ensure the security of university data and systems by establishing requirements for the proper maintenance and oversight of systems and applications used by university constituents.

    APPLIES TO 

    This policy applies to all individuals responsible for operating or overseeing any University system or application, whether on premise or in the cloud.

    DEFINITIONS  

    Academic / Research System: A system whose primary responsibility relates to individual academic work or research

    Administrative System: Any system that is used in support of the operation of the university excluding individual Academic / Research Systems.

    Client Network: A client network is a computer network where individual machines are connected. Client networks consume services and do not offer services to the general population

    ITS: Information Technology Services

    IT Professional: An individual (staff) who is trained and skilled in using technology to solve business problems coupled with assigned job duties in support of technology at the university. This must be a defined responsibility within the position job description and may not fall under “other duties as assigned.” Appropriate training, support, and budget must also be available in support of the IT Professional role.

    Local Network: The local network is those computers logically located in the same subnet

    SaaS: Cloud-based service that is delivered via the web based on either a monthly or annual subscription

    PaaS:  Cloud-based service that provides a platform allowing for the development of software using an established framework to improve development time and management of cloud services

    PII (Personally Identifiable Information):  Information that either singularly or in conjunction with other data elements could reasonably lead to the identification of specific individuals

    Public Availability: Services offered publicly include services offered outside of the local network

    Regulated Data: Any data that has regulations around its protection prescribed either by law or contract is automatically considered administrative data. Examples include: Personally Identifiable Information (PII), Payment Card Information (PCI), Personal Health Information (PHI) and FERPA (Family Educational Rights and Privacy Act)

    System Owner: The individual who is responsible for the planning and operation of the service. All systems must have a designated system owner.

    POLICY STATEMENT  

    The proper management, maintenance and support of systems and applications is critical to protecting the data they store or process from a confidentiality, integrity, and availability perspective.

    Basic Requirements (all systems including academic, administrative and research)

    System Ownership

    All systems including cloud-based systems supporting any aspect of the University must have an identified owner and responsible party for ensuring the controls specified in this policy.

    All software and services used to process University information are subject to an Information Security review and sign off prior to their purchase or development. Information Security reviews will evaluate specific risks and controls available and necessary based on the information being processed. The system owner will be responsible for the deployment of the agreed upon security controls prior to enabling the production capability of the system or application.

    System Access

    Access to information in the possession of or under the control of the University must be provided on a need-to-know basis. Information must be disclosed only to individuals who have a legitimate and approved need for the information. For most applications, this requires the use of proper authentication methodologies and the use of Single Sign On (SSO) is encouraged.

    Information may only be used for its intended purpose, and other uses of university information without the approval of the data owner is prohibited.

    Patching and Maintenance

    All system owners must ensure the timely implementation of operating systems and application patches to provide for the confidentiality, integrity, and availability of the systems or data. The ongoing maintenance of applications and the application of software updates is an activity that must be minimally scheduled on a quarterly basis.

    System and Application Lifecycle Management

    System owners are responsible for the planning of and budgeting for system maintenance and obsolescence. Any system or application that is no longer supported by the vendor or is replaced by newer technology should be decommissioned as soon as possible.  The decommissioning process must include the proper retirement of any physical hardware or virtual images and the proper destruction of any media (e.g., hard drives, tapes, etc.) that may have data. Cloud services that are decommissioned should ensure the proper handling of any data (return and/or destruction) in the cloud vendor’s possession as part of the contract cancellation.

    Cloud based systems

    Software as a Service / Platform as a Service

    While patching and maintenance of Cloud-based SaaS and PaaS systems is typically handled by the vendor, identified individuals are responsible for proper security configurations and user management associated with providing the service. A Vendor Risk Management review is necessary for all newly procured services.

    Infrastructure as a Service (IASS)

    IAAS provides a significant amount of flexibility in the configuration and use of the platform. This requires additional expertise that requires management by an IT Professional and where applicable must meet the same requirements as Administrative Systems.

    Administrative Systems

    System and Application Security

    Administrative systems due to their complexity must be managed by an IT Professional.

    Administrative systems will be required to adhere to all regulatory requirements and meet security controls / standards as set forth by the Information Security Office based on institutional requirements.

    Encryption

    All systems housing administrative data are expected to have data encrypted in transit and at rest to protect data. Where available, encryption keys should reside outside of the application.

    User Management

    University of Connecticut Information Technology Services (ITS) provides centralized user identity and access management that supports identity validation and access management (IAM) using a NetID and password providing for single sign on (SSO) across multiple systems. Systems and applications that rely on the University IAM platform for authenticating individual access rights can forgo the need for user management outside that of assigning any roles within the system or application, as necessary. The use of SSO for all systems is highly recommended.

    Systems and applications that do not use the central IAM solution must have a written plan and designated individual responsible for the creation, modification, and deletion of user IDs. User IDs, including student accounts, must be reviewed when faculty, staff, or students separate from the University at least annually. This includes a process for ensuring the secure creation of passwords and a secure password reset process for validating an individual’s identity prior to resetting the password.

    Systems where individuals have access to a significant amount of the PII of other constituents, including but not limited to students, faculty, staff, alumni, and vendors, or significant amounts of regulated data require two-factor authentication wherever possible.

    Software Maintenance

    Only necessary software should be loaded on systems, and old versions of software removed. The use of web browsers and other individual productivity tools should be limited to the management of the system only.

    Auditing of Systems and Application Logs

    System and application logs must be reviewed for inappropriate access on a regular basis (at least monthly) or via automated systems capable of detecting misuse through the analysis of frequent password failures, geographic anomalies, or inappropriate access attempts. ITS maintains a centralized logging and reporting platform, which can assist in the analysis of large amounts of data often associated with system and application logs. All administrative systems must log to the centralized logging and reporting platform events related to login activity and security event data.

    Mandatory Reporting

    All suspected policy violations, system intrusions, and other conditions that might jeopardize University information or information systems must be immediately reported to the Information Security Office.

    ENFORCEMENT 

    Systems and applications that do not follow the standards set forth in this policy may be administratively shut down or have access restricted. Systems maintained at the departmental or individual level may incur costs in association with enabling the proper protections or in the event of data exposure.

    Violations of this policy may result in appropriate disciplinary measures in accordance with University By-Laws, General Rules of Conduct, applicable collective bargaining agreements, and the Student Code.

    PROCEDURES/FORMS 

    Questions about this policy or suspected violations may be reported to any of the following: 

    Office of University Compliance –  https://compliance.uconn.edu (860-486-2530) or UConn Reportline (1-888-685-2637)

    Information Technology Services Tech Support –  https://techsupport.uconn.edu (860-486-4357) 

    Information Security Office – https://security.uconn.edu 

    POLICY HISTORY 

    Policy created: August 30, 2021 (Approved by President’s Senior Team)

    Revisions: August 30, 2023 (Approved by the Senior Policy Council and the President)

     

    Network Access Policy

    Title: Network Access Policy, Information Technology
    Policy Owner: Information Technology Services / Chief Information Security Officer 
    Applies to: All students, faculty, staff, volunteers, and contractors  
    Campus Applicability: All campuses except UConn Health 
    Effective Date: August 30, 2021
    For More Information, Contact UConn Information Security Office 
    Contact Information: techsupport@uconn.edu or security@uconn.edu 
    Official Website: https://security.uconn.edu

    PURPOSE 

    The University invests significantly in maintaining a secure network that meets the academic, research, residential, and administrative needs of the institution. To ensure compliance with applicable Federal and State laws and regulations, and to protect the campus network and the ability of the University community to use it, certain security, performance, and reliability requirements must govern the operation of these networks. 

    APPLIES TO 

    This policy applies to all University faculty, staff, students, student employees, volunteers, and contractors who have access to university networks. 

    DEFINITIONS  

    University Network: The university network is comprised of the network hardware and infrastructure and the services to support them, from the data jack or wireless access point to the University’s Internet Service Provider’s (ISP) connection. The university network begins at the connection to the network (wired or wireless) and ends where we connect to the Internet. 

    Wired Network:  The wired network consists of the physical cabling, infrastructure, and management systems that provide physical network access via an ethernet or fiber optic cable. 

    Wireless Network:  The wireless network consists of the access points (connected to the wired network), wireless spectrum, and management systems that provide services via the UConn provided wireless networks, including UConn Secure, Guest, EDUROAM, and other specialty networks. 

    POLICY STATEMENT  

    The University network (wired & wireless) is an essential resource for the University of Connecticut students, faculty, staff, and guests. The University network provides a variety of critical services that meet the academic, administrative, research and residential needs of the University. Due to the complex nature of the University’s network, Information Technology Services (ITS) is responsible for the overall design, installation, coordination and operation of the University’s network environment. 

    Wired Networks 

    • The wiring and electronic components of the network are deemed part of the basic infrastructure and utility services of the University. Installation and maintenance of that network are to be considered part of the “up front” basic required building and renovation costs and are not considered discretionary options in construction and renovation design. 
    • Standards for the network wiring, electrical components, and their enclosures are defined by Information Technology Services (ITS), subject to Building and Grounds (B&G) oversight and are considered part of the University’s “building code” to which installations must conform. 
    • Upgrades to our campus network will be done as part of a university-wide Network Master Plan.  This Network Master Plan will be coordinated with the University’s Building Master. 
    • Units that would like to use their own funding to install wired/wireless technology or change the programmatic function or use of a room to newly include a wired/wireless activity must work directly with ITS Network Engineering for design services and standards requirements. ITS Network Engineering will thereby ensure that all changes to the wired network conform to applicable standards. 
    • Units choosing to install and establish their own security using local firewalls and/or VPNs must give ITS Network Engineering and Information Security access to/through these devices into the active network segments. This will give Network Engineering the ability to see beyond the secure points of the network for diagnosing problems potentially affecting the overall network. 
    • Units wishing to design, install and maintain their own network must have their designs reviewed by ITS Network Engineering. All installations must conform to the standards set forth in the ITS Design Guide and Standards. Before equipment is purchased, the requesting entity must submit technical specifications of the equipment to be used in the project, along with the logical and physical design maps, for ITS approval to ensure network compatibility and service conformance. ITS Network Engineering will provide the department with an approval letter, which can be submitted to Purchasing with the purchase request. 

      Wireless Networks 

      • The addition of new wireless access points on the University network must be coordinated and approved by ITS.  Wireless performance is impacted by the architectural features, building materials, and furnishings of a contemporary workspace.  Construction and renovation projects must be coordinated with ITS and include funding for additions or adjustments required to optimize performance and serviceability of impacted wireless access points and systems. 
      • On an exception basis, departments and individual faculty may install and manage wireless access points for specific programmatic needs. These locally administered wireless access points must be registered and coordinated with ITS prior to deployment to prevent radio frequency (RF) interference on either wireless network.  At least one individual in the requesting department must be designated as the official contact for the access point.  The official contact is responsible for the data and network traffic that traverses through the access point and appropriate access control and security configurationas well as the regular maintenance, software updates, and replacement. 
      • Any devices either not part of or that cause significant RF interference with the University wireless network will be considered a “rogue” access point or device.  ITS will pursue all reasonable efforts to contact the owner of the rogue device, and if necessarymay disable or disconnect them from the University network. This includes devices and equipment that operate in the frequency ranges occupied by the University Wi-Fi network. 

      ENFORCEMENT 

      Violations of this policy may result in appropriate disciplinary measures in accordance with University By-Laws, General Rules of Conduct for All University Employees, applicable collective bargaining agreements, and the Student Code.  

      Questions about this policy or suspected violations may be reported to any of the following: 

      Office of University Compliance –  https://compliance.uconn.edu (860-486-2530) 

      Information Technology Services Tech Support –  https://techsupport.uconn.edu (860-486-4357) 

      Information Technology Services CIO – https://cio.uconn.edu  

       

      POLICY HISTORY 

      Policy created:  This policy replaces the Wireless Network Policy (05/15/2006) and Physical Network Access Policy (11/18/2008). Approved by President’s Senior Team 8/30/2021. 

       

      Firewall Policy

      Title: Firewall Policy 
      Policy Owner: Information Technology Services / Chief Information Security Officer 
      Applies to: All students, faculty, and staff responsible for configuring firewalls 
      Campus Applicability: All campuses except UConn Health 
      Effective Date: August 30, 2021
      For More Information, Contact UConn Information Security Office 
      Contact Information: techsupport@uconn.edu or security@uconn.edu 
      Official Website: https://security.uconn.edu/

      PURPOSE 

      To ensure a common set of firewall configurations across the organization to maximize their protection and detection capabilities in support of the security of the University. Firewalls provide a valuable protection and detection capability for the organization when properly configured, managed, and monitored.  

      APPLIES TO 

      This policy applies to all University faculty, staff, students, student employees, volunteers, and contractors who have responsibility for controlling or configuring firewalls. 

      DEFINITIONS 

      EOL: End of Life 

      EOS: End of Support 

      IANA: Internet Assigned Numbers Authority (iana.org)  

      POLICY STATEMENT  

      The University operates in a highly flexible and adaptive security environment to meet its academic, research, and administrative missions. While the ability to adapt to meet the ever-changing needs of the University is important, oversight and reporting of firewall activities are critical to the successful protection and operation of the University environment. The following firewall requirements must be met: 

      Firewall Configuration Standards 

      • All firewalls must be properly maintained from a hardware and software perspective. This includes proper lifecycle planning for EOL and EOS software/hardware and regular review (at least annually) of firewall rulesets. 
      • All dedicated firewalls used in production must follow the University firewall management standard, which includes the ability to review currently configured firewall rules across the organization, identification of shadow or redundant rules and rules in conflict, and standardization of device/object names.  
      • Firewall rulesets and configurations must be backed up frequently to alternate storage (not on the same device). Multiple generations must be captured and retained in order to preserve the integrity of the data, should restoration be required. Access to rulesets, configurations and backup media must be restricted to those responsible for administration and review. 

      Firewall Rules 

      Firewall rules specify (either allow or deny) the flow of traffic through the firewall device. Firewall rules are typically written based on a source object (IP address/range, DNS Name, or group), destination object (IP address/range, DNS Name, or group), Port/Protocol and action. 

      • All firewall implementations should adopt the principal of “least privilege” and deny all inbound traffic by default. The ruleset should be opened incrementally to only allow permissible traffic. 
      • Outbound traffic should be enumerated for data stores, applications, or services 
      • Overtly broad rules may be allowed for specific groups of individuals (not systems). Approval must be granted by the Chief Information Security Officer or their designee. 
      • The use of overly permissive firewall rules is prohibited (i.e., ANY/ANY/ALL rules). 
      • Protocols defined in services and in the firewall must utilize Service Name and Protocol/Port information as assigned by IANA, unless there is a technical reason to do otherwise other than “security through obscurity” and must be commented appropriately in the ruleset.  

        Firewall Logging 

        Firewall log integrity is paramount to understanding potential threats to the network. Firewall devices must log the following data to a system outside of the physical firewall itself and must be regularly reviewed at least monthly or programmatically through automated means. Firewall logs may be forwarded to the ISO SIEM for retention and analysis. 

        The following items must be logged as part of the operation of the firewall: 

        • All changes to firewall configuration parameters, enabled services, and permitted connectivity 
        • Any suspicious activity that might be an indicator of either unauthorized usage or an attempt to compromise security measures 

        ENFORCEMENT 

        Violations of this policy may result in appropriate disciplinary measures in accordance with University By-Laws, General Rules of Conduct for All University Employees, applicable collective bargaining agreements, and the Student Code.  

        Questions about this policy or suspected violations may be reported to any of the following: 

        Office of University Compliance –  https://compliance.uconn.edu (860-486-2530) 

        Information Technology Services Tech Support –  https://techsupport.uconn.edu (860-486-4357) 

        Information Security Office – https://security.uconn.edu 

         

        POLICY HISTORY 

        Policy created: August 30, 2021 [Approved by President’s Senior Team]

        Information and Communication Technology (ICT) Accessibility Policy

        Title: Information and Communication Technology (ICT) Accessibility Policy
        Policy Owner: Information Technology Services
        Applies to: Faculty, Staff, Students
        Campus Applicability: Storrs and Regional Campuses
        Effective Date: July 24, 2019
        For More Information, Contact Information Technology Services-IT Accessibility Coordinator
        Contact Information: itaccessibility@uconn.edu; (860) 486-9193
        Official Website: accessibility.its.uconn.edu

        Background and Reason for the Policy: The University of Connecticut is committed to accessibility of its digital information, communication, content, and technology for people with disabilities, in accordance with federal and state laws including the Americans with Disabilities Act, Section 504 of the Rehabilitation Act of 1973, and the State of Connecticut’s Universal Website Accessibility Policy for State Websites.

        Policy Purpose: The purpose of this policy is to set expectations that digital information, communication, content, and technology be designed, developed, and procured to be accessible to people with disabilities.

        Policy Applicability: This policy extends to the procurement, development, implementation, and ongoing maintenance of the University’s information and communication technologies at Storrs and Regional Campuses.

        Policy Statement: The University of Connecticut is committed to achieving equal opportunity to its educational and administrative services, programs, and activities in accordance with federal and state law.  Providing an accessible information, communication, content, and technology experience for people with disabilities is the responsibility of all University administrators, faculty, staff, students and those who maintain externally facing University websites.

        Procedures: See Procedures (https://accessibility.its.uconn.edu/ict-policy-procedures/).  Any issues or questions should be addressed to ITAccessibility@uconn.edu.

        Exceptions: Requests for exceptions to this policy must be submitted to the IT Accessibility Coordinator. Individuals requesting an exception must provide a plan that would provide equally effective alternative access, unless such an alternative is not possible due to technological constraints or if the intended purpose of the technology (e.g., virtual reality goggles) at issue does not allow for an alternative

        Policy History:

        Adopted 07/24/2019 [Approved by the President’s Cabinet]