Office of Information Technology Policies

Articles (7)

Data Integrity Policy

In order to assure data integrity and network security, the Office of Information Technology at the University of Central Oklahoma has taken measures to ensure that information can only be accessed or modified by those authorized to do so. Procedures have been implemented to protect data integrity from environmental hazards as well.

Email Blast Policy and Guidelines

The university follows the Email Blast Policy to ensure we are messaging our target audience in a way that is acceptable. All email blasts will follow this policy.

Privacy, Nondiscrimination & Disclaimer Statement

The University of Central Oklahoma (UCO) provides the Internet site (uco.edu) as a service to students, faculty, staff, alumni and the community. The intended purposes of this site include education, information dissemination, and promotion of the goals of the University.

Responsible Use of Technology at UCO

The Responsible Use of Technology policy outlines appropriate use of computers, printers, fax machines, and other technology hardware, software, and the network on which all are connected.

Technology and Network Usage Policy

The University of Central Oklahoma has the responsibility for securing its computing and networking systems (both academic and administrative) against unauthorized access, while making the systems accessible for legitimate academic and administrative uses.

UCO Security Policy (Information Security Policy)

The Office of Information Technology is committed to protecting the University of Central Oklahoma; its students, faculty and staff; and its partners from knowingly or unknowingly using technology illegally or through damaging actions. The complete list of policies, guidelines, and procedures regarding the protection and security of technological information that will serve as the University’s standards is listed within this article.