ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
  • Immediate family members

    Immediate family is a spouse, domestic partners, civil union partner or dependent child.

  • Indemnification agreements

    A legally binding arrangement whereby the University promises a sum of money in compensation for loss, injury, or damage or for trouble and annoyance.

  • Independent student organizations

    Student organizations that have never received, or will not receive, any support funding from the University.
  • Informal credit relationship

    One between an individual and the University where a credit arises as a result of payment not being received when services are delivered
  • Information security officer

    The person who performs day-to-day management of and is the point of contact for the IT Security Program at the campus level.

  • Internal controls

    A comprehensive strategy (i.e., which includes people and tone as well as policies and procedures) designed to provide reasonable assurance that the following objectives of the University are achieved: • Effectiveness and efficiency of operations, • Reliability of financial reporting, and • Compliance with applicable laws, regulations, policies, and procedures, as well as contracts, grants and donor restrictions. Key activities include protection of assets; adequate authorization and record keeping procedures; proper segregation of duties; and monitoring and assessment of internal controls.
  • IT resource

    Computers, networking equipment, storage media, software, and other electronic devices that store, process, or transmit University information. In the context of IT security policy, this includes all IT resources that are owned, leased, licensed, or authorized for use by the University.

  • IT resource user

    Individuals that are authorized to use University IT resources. Examples of users include: faculty, staff, students, researchers, vendors, volunteers, contractors, or sponsored affiliates of the University.

  • IT security

    The protection of electronic information from (intentional or unintentional) unauthorized access, modification, or destruction, as well as taking precautions to ensure that such information is available as needed to conduct University business.

  • IT security principal

    On May 1, 2014 the title of “IT Security Principals” was replaced with the title of “Information Security Officers”.

  • IT security program

    A collection of policies, processes, and responsibilities that provide direction and guidance to the computing community on protecting University information.

  • IT service provider

    Any person that designs, builds, implements, supports, or provides an IT service to other University employees, students, or affiliates, using a University IT resource. Examples of IT service providers include: website administrators, workstation support staff, server administrators, software programmers, application developers, data network technicians, user account administrators, and computer center personnel.