In order to assure data integrity and network security, the Office of Information Technology at the University of Central Oklahoma has taken measures to ensure that information can only be accessed or modified by those authorized to do so. Procedures have been implemented to protect data integrity from environmental hazards as well.
The university follows the Email Blast Policy to ensure we are messaging our target audience in a way that is acceptable. All email blasts will follow this policy.
The University of Central Oklahoma (UCO) provides the Internet site (uco.edu) as a service to students, faculty, staff, alumni and the community. The intended purposes of this site include education, information dissemination, and promotion of the goals of the University.
The Responsible Use of Technology policy outlines appropriate use of computers, printers, fax machines, and other technology hardware, software, and the network on which all are connected.
The University of Central Oklahoma has the responsibility for securing its computing and networking systems (both academic and administrative) against unauthorized access, while making the systems accessible for legitimate academic and administrative uses.
The Office of Information Technology is committed to protecting the University of Central Oklahoma; its students, faculty and staff; and its partners from knowingly or unknowingly using technology illegally or through damaging actions. The complete list of policies, guidelines, and procedures regarding the protection and security of technological information that will serve as the University’s standards is listed within this article.