{"id":35685,"date":"2024-12-05T07:56:33","date_gmt":"2024-12-05T15:56:33","guid":{"rendered":"https:\/\/inside.ewu.edu\/it\/?page_id=35685"},"modified":"2025-08-19T13:21:02","modified_gmt":"2025-08-19T20:21:02","slug":"policies-and-governance","status":"publish","type":"page","link":"https:\/\/inside.ewu.edu\/it\/policies-and-governance\/","title":{"rendered":"IT Policies and Governance"},"content":{"rendered":"<div class=\"gb-container gb-container-75c78a3a\">\n<div class=\"gb-container gb-container-393ae9e3 gb-tabs\" data-opened-tab=\"1\">\n<div class=\"gb-container gb-container-137b33cc gb-tabs__buttons\">\n\n<button class=\"gb-button gb-button-f0e0efc7 gb-button-text gb-tabs__button gb-block-is-current\" id=\"gb-tab-button-f0e0efc7\">Policies<\/button>\n\n\n\n<button class=\"gb-button gb-button-00fc86fa gb-button-text gb-tabs__button\" id=\"gb-tab-button-00fc86fa\">Governance<\/button>\n\n\n\n<button class=\"gb-button gb-button-a768ed0e gb-button-text gb-tabs__button\" id=\"gb-tab-button-a768ed0e\">Procedures<\/button>\n\n\n\n<button class=\"gb-button gb-button-30b53d40 gb-button-text gb-tabs__button\" id=\"gb-tab-button-30b53d40\">Committees and Groups<\/button>\n\n<\/div>\n\n<div class=\"gb-container gb-container-baf2c431 gb-tabs__items\">\n<div class=\"gb-container gb-container-de826b1a gb-tabs__item gb-tabs__item-open\" id=\"gb-tab-item-de826b1a\">\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/inside.ewu.edu\/policies\/policies-and-procedures\/ewu-901-02-appropriate-use-of-university-resources\/\" target=\"_blank\" rel=\"noreferrer noopener\">EWU 901-02: Appropriate Use of University Resources<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/policies\/knowledge-base\/ewu-policy-201-05-electronic-signatures\/\" target=\"_blank\" rel=\"noreferrer noopener\">EWU 201-05 Electronic Signatures<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/policies\/knowledge-base\/ewu-203-01\/\" target=\"_blank\" rel=\"noreferrer noopener\">EWU 203-01: Information Security<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/policies\/knowledge-base\/ewu-202-08\/\" target=\"_blank\" rel=\"noreferrer noopener\">EWU 202-08: Identity Theft Prevention Program<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/policies\/knowledge-base\/ewu-203-08-mobile-devices\/\" target=\"_blank\" rel=\"noreferrer noopener\">EWU 203-08: Mobile Devices<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/policies\/policies-and-procedures\/ewu-policy-203-05-accessible-technology\/\" target=\"_blank\" rel=\"noreferrer noopener\">EWU 203-05 Accessible Technology<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/policies\/knowledge-base\/ewu-203-07-hipaa-compliance\/\" target=\"_blank\" rel=\"noreferrer noopener\">EWU 203-07: HIPAA Compliance<\/a><\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-42b4d214 gb-tabs__item\" id=\"gb-tab-item-42b4d214\">\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2018\/08\/Campus-Service-Level-Agreement-SLA.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Campus Service Level Agreement (SLA)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/docs.google.com\/spreadsheets\/d\/1J-9YGMwqNG9Nx7Aw8OyCbbPdF5fGiciGIKF7WC22mfQ\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">Campus Application Inventory<\/a> (requires login)<\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/ellucian-advisory-services-request-form\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ellucian Advisory Services Engagement Request<\/a> (requires login)<\/li>\n\n\n\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1uuirp8lmifGGf7GsLv9bCgcKu4HY6inxlbZqIf83QJM\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">IT Strategy and Roadmap<\/a> (requires login)<\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2019\/03\/IT-Project-Prioritization-Process.pdf\">IT Project Prioritization Process<\/a><ul><li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2019\/03\/IT-Project-Prioritization-Process-Flowchart.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Process Flowchart<\/a><\/li><\/ul>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/policies-and-governance\/it-project-request\/\" target=\"_blank\" rel=\"noreferrer noopener\">Project Intake Form<\/a> (requires login) (<a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2023\/03\/Project-Intake-Form-Preview.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Download Preview<\/a>)<\/li>\n\n\n\n<li><a href=\"https:\/\/docs.google.com\/spreadsheets\/d\/1gETf3_BvPonJaO1jY7JhSafHY3H2Jd4SrRz-xVqsK7A\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">Project List<\/a> (requires login)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"https:\/\/support.ewu.edu\/support\/catalog\/items\/84\" target=\"_blank\" rel=\"noreferrer noopener\">Request Software License Agreement Review<\/a> (requires login)\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/support.ewu.edu\/support\/solutions\/articles\/10000046313\" target=\"_blank\" rel=\"noreferrer noopener\">List of Previously Reviewed Agreements<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>IT Survey Results\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2021\/12\/EWU-Student-IT-Survey-2018.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">2018 Student Survey Results<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2020\/06\/EWU-Student-IT-Survey-2020.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">2020 Student Survey Results<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2021\/12\/EWU-Student-IT-Survey-2021.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">2021 Student Survey Results<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2024\/03\/EWU-Student-IT-Survey-2023.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">2023 Student Survey Results<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2021\/12\/EWU-Faculty-Staff-IT-Survey-2018.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">2018 Faculty-Staff Survey Results<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2020\/06\/EWU-Faculty-Staff-IT-Survey-2020.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">2020 Faculty-Staff Survey Results<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2021\/11\/EWU-Faculty-Staff-IT-Survey-2021.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">2021 Faculty-Staff Survey Results<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2024\/03\/EWU-Faculty-Staff-IT-Survey-2023.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">2023 Faculty-Staff Survey Results<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-fe2c3882 gb-tabs__item\" id=\"gb-tab-item-fe2c3882\">\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2024\/03\/Academic-Guidelines-for-the-Use-of-Generative-AI.pdf\">Academic Guidelines for the Use of Generative AI<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2020\/01\/Account-Creation-and-Closure-Procedure.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Account Creation and Closure Procedure<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2020\/01\/Account-Eligibility-Procedure.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Account Eligibility Procedure<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2018\/08\/Backup-Standards-and-Procedures.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Backup Standards and Procedures<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2022\/03\/Employee-and-Student-Bus-Pass-Eligibility-Procedure.pdf\">Employee and Student Bus Pass Eligibility Procedure<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2018\/10\/Campus-Outage-Notification-Procedure.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Campus Outage Notification Procedure<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2019\/09\/Change-Management-Procedure.pdf\">Change Management Procedure<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2022\/05\/Course-Groups-Procedure.pdf\">Course Groups Procedure<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2022\/07\/Data-Expiration-and-Orphaned-Data-Procedure.pdf\">Data Expiration and Orphaned Data Procedure<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2020\/11\/Disposal-and-Reassignment-of-Information-Technology-Equipment-Procedure.pdf\">Disposal and Reassignment of Information Technology Equipment Procedure<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2018\/10\/Electronic-Mail-Email-Forwarding-Procedure.pdf\">Electronic Mail (Email) Forwarding Procedure<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2023\/10\/Generative-AI-Guidelines-1.pdf\">Generative AI Guidelines<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2019\/04\/Incident-Response-Procedure.pdf\">Incident Response Procedure<\/a>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/incident-reporting-form\/\" target=\"_blank\" rel=\"noreferrer noopener\">Incident Reporting Form<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2018\/08\/Information-Technology-Physical-Access-Procedure.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Information Technology Physical Access Procedure<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2018\/08\/Internet-Domain-Name-Procedure.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Internet Domain Name Procedure<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2025\/08\/Internet-of-Things-IoT-Device-Connection-Procedure.pdf\" data-type=\"attachment\" data-id=\"36140\">Internet of Things (IoT) Device Connection Procedure<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2019\/07\/Mobile-Device-Management-Procedure.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Mobile Device Management Procedure<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2021\/01\/Multi-Factor-Authentication-Procedure.pdf\">Multi-Factor Authentication Procedure<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2021\/03\/Network-and-Security-Monitoring-Procedure.pdf\">Network and Security Monitoring Procedure<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2021\/03\/Password-Complexity-and-Expiration-Requirements.pdf\">Password Complexity and Expiration Requirements<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2023\/04\/Patching-and-Vulnerability-Management-Procedure.pdf\">Patching and Vulnerability Management Procedure<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2022\/11\/Privacy-Policy.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Privacy Policy<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2025\/01\/Privileged-Account-Use-Procedure.pdf\" data-type=\"link\" data-id=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2025\/01\/Privileged-Account-Use-Procedure.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Privileged Account Use Procedure<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2020\/12\/Reporting-Security-Guidelines.pdf\">Reporting Security Guidelines<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2021\/03\/Support-for-Personally-Owned-Device-Guidelines.pdf\">Support for Personally-Owned Device Guidelines<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2021\/03\/Workstation-Permissions-Procedure.pdf\">Workstation Permissions Procedure<\/a><\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-7848de0f gb-tabs__item\" id=\"gb-tab-item-7848de0f\">\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/inside.ewu.edu\/asewu\/faculty-committees-councils\/\">Academic Committee for Innovation and Technology<\/a>, which advises Information Technology and Academic Affairs on the standards, guidelines, policies and planning that supports the use of technological resources to enhance the quality of teaching and learning, research and other scholarly activities.<\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/bannerusers\/\">Banner Users Groups<\/a>, which is a forum for discussion and feedback for functional users of Banner and related enterprise systems.<\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/dmc\/\">Data Management Committee<\/a>, which acts as authority for all data and provides oversight of institutional data.<\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/information-technology-council\/\" target=\"_blank\" rel=\"noreferrer noopener\">IT Council<\/a>, which advises the Chief Information Officer and the Executive Leadership Team on matters related to strategic technology planning, policy, and resource allocation<\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/techfee\/\">Student Tech Fee Committee<\/a>, which advises Information Technology and \u201cdirects spending exclusively for technology resources for general student use.\u201d<\/li>\n\n\n\n<li><a href=\"https:\/\/inside.ewu.edu\/it\/wp-content\/uploads\/sites\/14\/2018\/08\/Web-Governance-Committee-Charter.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Web Governance Committee<\/a>, which provides oversight and strategic direction for all EWU web pages to the Information Technology and Marketing and Communications departments.<\/li>\n<\/ul>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":33702,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wpo365_audiences":[],"wpo365_private":false,"footnotes":""},"class_list":["post-35685","page","type-page","status-publish"],"publishpress_future_action":{"enabled":false,"date":"2026-04-16 06:10:46","action":"change-status","newStatus":"draft","terms":[],"taxonomy":""},"_links":{"self":[{"href":"https:\/\/inside.ewu.edu\/it\/wp-json\/wp\/v2\/pages\/35685"}],"collection":[{"href":"https:\/\/inside.ewu.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/inside.ewu.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/inside.ewu.edu\/it\/wp-json\/wp\/v2\/users\/33702"}],"replies":[{"embeddable":true,"href":"https:\/\/inside.ewu.edu\/it\/wp-json\/wp\/v2\/comments?post=35685"}],"version-history":[{"count":7,"href":"https:\/\/inside.ewu.edu\/it\/wp-json\/wp\/v2\/pages\/35685\/revisions"}],"predecessor-version":[{"id":36141,"href":"https:\/\/inside.ewu.edu\/it\/wp-json\/wp\/v2\/pages\/35685\/revisions\/36141"}],"wp:attachment":[{"href":"https:\/\/inside.ewu.edu\/it\/wp-json\/wp\/v2\/media?parent=35685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}