Skip Navigation
*To search for student contact information, login to FlashLine and choose the "Directory" icon in the FlashLine masthead (blue bar).



Find out about our services
Three ways to get support
Learn how we provide educational tools for in the classroom and online
Learn Policies & Procedures

 

Additional Resources

Policies and Procedures

Information Technology Policies

Access to modern information technology is essential to the university’s mission. The following policies regarding information technology and security have been established in the Kent State University Policy Register:

University policy on responsible use of information technology

Administrative policy on responsible use of information technology

Administrative policy regarding electronic communications for students

Administrative policy regarding web publishing

 

Information Technology Procedures

The Division of Information Services has developed the following procedures and guidelines to support the information technology and security policies.

Security Requirements for Faculty and Staff

A list of university security requirements put in place to maintain the integrity of the electronic information, especially that which pertains to our faculty, staff, and students.

 

Reporting Security Incidents

Incident Response

The Office of Security and Access Management assists in responding to and investigating incidents related to the misuse of Kent State University computing systems. Computer system security breaches resulting in unauthorized disclosure of University data or abuse of computing resources should be reported immediately to the Office of Security and Access Management.

In the event of an incident, call 330-672-5566. If your call is unanswered, listen carefully to the voicemail greeting for additional instructions. Please leave a detailed message, including a phone number you can be reached. It is very important that you reach a human being so that the issue can be addressed promptly.

Procedure Regarding Unauthorized (Rogue) Wireless Access Points and Routers

University policy prohibits the deliberate degradation of the performance of network resources or access. For more information, please see rogue wireless access points and routers


 

Credit Card Processing

Guidelines have been established to be used by departments when collecting credit card information from individuals in order to process payments for services, purchases, registrations, etc. Read more about credit card information security.

 

KSU Google Apps

Kent State University issues Google Apps accounts to all student employees, faculty and staff
Google Apps is a communications and collaboration suite consisting of a core set of applications that may be used to perform both educational as well as academic and other university-related functions. 

For more information please read the  KSU Google Terms of Service.

 

Security Firewalls

For more information about firewalls, please contact the security group at 330-672-5566.

 

Secure Disposal of Equipment


Disposal of IT Equipment

Obsolete and damaged electronic equipment includes devices that plug into the wall or operate with batteries. For more information, please see the service catalog entry regarding disposal of IT equipment.


Disposal of DVDs, CDs and magnetic tapes

Information Services offers a secure means to dispose of surplus magnetic tapes, CDs and DVDs. Please see disposing of surplus media.