UTAMU ICT Policy
UTAMU ICT Policy
UTAMU ICT Policy
MANAGEMENT UNIVERSITY
ICT POLICY
The UTAMU’s ICT Policy is a guide on how ICTs shall be used to achieve the goals and
aspirations of UTAMU. It highlights how the usage of ICTS shall be implemented, their
development and maintenance, the optimal distribution of resources (hardware,
software, data and human resources) as well as the safe and healthy utilization of ICTs
and the environment. This policy seeks to enumerate the rules necessary to ensure the
existence of the highest levels of consistency, control and harmonious interaction with
ICT technologies.
UTAMU is committed to providing safe, effective and efficient usage of ICT facilities by
UTAMU stakeholders (Academic and Administrative Staffs, students, Visitors).
The Mission of the university is “To provide global quality education, Research and
innovation critical to economic and human development.
1
The ICT Department, demonstrates an on-going commitment to mainstreaming ICT
usage by ensuring that the relevant policies, practices, metrics are in place. Frequent
and consistent communication will be issued by the ICT department about tips on how
to execute safer, more secure and efficient operations. This will be broadcast to the
affected or target audience(s).
UTAMU supports diversity and does not discriminate against minority entities based on
age, gender, race, sexual orientation, religion, political affiliation, e.t.c. Diversity is
encouraged in the different spheres like educational preferences, research interests,
funding preferences, work-life-balance, performance management, career management
and other inclinations or variations.
UTAMU is committed to continuously re-tool, educate and train all employees, lecturers
and administrators in order to improve on institutional practices.
UTAMU operates in an open and flexible environment and welcomes people from
diverse backgrounds. The work culture at UTAMU is based on the principles of hard
work, creativity, fairness and resource optimization.
The UTAMU ICT Policy contains the following policies, their objectives and strategies:
2
1. Acceptable Use Policy
2. Electronic Mail Policy
3. Anti-virus and Anti-Spam Policy
4. User Password Policy
5. Data Backup & Restoration Policy
6. Software Use Policy
7. Internet Bandwidth Policy
8. Computer Lab Policy
9. Computer Equipment Policy
10. E-Learning Policy
11. Support Desk Policy
The purpose of this policy is to ensure the proper use of UTAMU’s ICT facilities,
software, services and systems by its employees (academic and administrative), guests
and students in an appropriate, responsible, and ethical manner. This policy also applies
to the use of privately owned computers or notebooks connected to the University
network.
V.1.1 OBJECTIVES
This acceptable use policy has been drawn up with the following objectives:
To encourage the use of both the Internet and hardware as a conduit for free
expression without infringing the rights of others.
To protect and preserve the privacy of individual users and the public at large.
To discourage the irresponsible use of hardware and network resources, which
use may result in the degradation of service.
To ensure the security, reliability and privacy of UTAMU's system and network
infrastructure.
To avoid situations that may result in the occurring of any form of civil liability.
To propagate the image and reputation of UTAMU as a reliable and responsible
University.
V.1.2 STRATEGIES
a) The UTAMU community as a whole must be warned that they must not use the
ICT facilities, software, services and systems in any illegal, immoral or otherwise
unauthorized manner.
b) UTAMU reserves the right to monitor and record all activities related to University
activities using ICT facilities, software, services and systems.
3
a) The Directorate for ICT, Quality assurance and Library services is responsible for
the following:
V.2.1 OBJECTIVES
V.2.2 STRATEGIES
i. Be responsible and liable for all messages sent from their e-mail accounts
and ultimately responsible for all activity performed under their account.
ii. Keep his password secret e.g. by not disclosing it out to another person,
frequently changing it, not writing passwords down or using any other
processes that facilitate automatic log-on.
iii. Use only e-mail accounts that they are authorized to use.
iv. Use email accounts for legal, moral and authorized activities, e.g. by not
committing a crime using his/her email account.
e) The mailbox owner is expected to regularly carry out some activities to manage
email accounts and documents. This include:
i. Reading all the new e-mail messages at least once in every 1 or 2 days
and replying as soon as possible
ii. Not letting messages build up in the Inbox and deleting messages as soon
they are no longer needed.
iii. Opening the ‘Sent messages’ folder at least once a week and deleting old
messages that are no longer needed.
iv. Saving messages that they want to keep onto the hard disk or removable
disk.
v. Logging out of the email account before exiting the application.
f) Mailbox owners are expected to adopt practices that increase privacy and
confidentiality of their email communications. They need to be aware of the
following:
5
iii. E-mail messages may be sent to incorrect e-mail addresses or be
improperly delivered by an e-mail system or Internet Service Provider
(ISP).
iv. It may be possible for other people to read or change messages that you
send by forwarding it to others.
v. New e-mail will be prevented from coming in to the mailbox once the
mailbox has reached the maximum allowable storage space.
V.3.1 OBJECTIVE
To ensure that the University will provide its community with adequate protection from
computer viruses, unsolicited and unwanted emails. The university shall invest and
deploy anti-virus and anti-spamming software on ICT facilities owned or leased by the
University as well as on ICT services outsourced by the University.
V.3.2 STRATEGIES
a) The Directorate for ICT, Quality assurance and Library services is responsible for
the following:
i. Installing anti-virus software to ensure that all networked computer
servers, computers and notebooks used by the University users are
protected against virus infections.
ii. Installing Anti-Spam software that automatically separates suspected
spam from regular mail.
iii. Minimizing any misuse or illegal use of email communications.
iv. Protecting the community against other malicious attacks like denial of
service, spy ware, phishing, e.t.c
6
The policy ensures that the user has the minimum standard applied to their user
password to support the confidentiality, integrity and security of the University ICT
resources. This policy refers to users of university resources that require passwords.
V.4.1 OBJECTIVES
The objectives are to ensure access control to the ICT resources, to communicate the
needs to have protection against unauthorized access and to establish an ICT
environment that will encourage data sharing and exchange without sacrificing security.
V.4.2 STRATEGIES
a) The Directorate of ICT, Quality assurance and Library services is responsible for
the providing passwords for access to sensitive or controlled environments like
email accounts, tests and examinations, restricted rooms, sensitive files and
folders as well as various gadgets.
V.5.1 OBJECTIVES
To define the backup and restoration of data and information associated with the
University operations. This policy applies to only staff of the University who create,
process and store data and information using the ICT resources. With this policy in
place, we can ensure copies of critical data are retained and available in case of
disaster, software or hardware failures.
V.5.2 STRATEGIES
7
a) The Directorate for ICT, Quality Assurance and Library services is
responsible for:
i. Performing daily back up for the entire critical corporate database
for the entire University.
ii. Keeping back up disks in an offsite locked place only known to Vice
Chancellor.
iii. Clearly marking all back up disks with a name and creation date.
This will ease identification.
iv. Providing the necessary storage and backup support to staff.
v. Periodically testing the backup disks to ensure they are
recoverable.
V.6.1 OBJECTIVES
To ensure that software that the University adopts provides the service as expected.
This includes the financial management software, human resources, academic records
and any other software in use.
V.6.2 STRATEGIES
b) The Directorate for ICT, Quality Assurance and Library services shall:
i. Procure the software after approval from the relevant organs.
ii. Procure software licenses after approval from the relevant organs
iii. Install the software to on authorized computers or notebooks.
iv. Record all installed software in a software directory.
V.6.1 OBJECTIVES
V.6.2 STRATEGIES
V.8.1 OBJECTIVE
The main objective is to manage the use of computing lab and to maintain its security.
V.8.2 STRATEGIES
Students are to adhere to the following guidelines while using the computing labs:
V.9.1 OBJECTIVES
Due to the variety and nature of work performed by staff and students across the entire
University, it is not practical and easy to define a standard operating environment for all
equipment. This section provides a guide to what is expected of the equipment used by
the University community.
V.9.2 STRATEGIES
11
Bootable Recovery CD for each computer (desktop/notebook)
supplied. Recovery CD to be produced ‘after’ laptop is configured
Recovery CD from manufacturer.
e) Printers
Hewlett Packard printers, plotters and scanners are the standard. The model purchased
will depend
on the requirement, either for portable computing, desktop printing or group printing.
V.10 E-LEARNING
a) The procedure that follows after a violation of this policy is reported or noticed is
that:
i. The Director of the Directorate for ICT, Quality assurance and Library
Services will set up a team to investigate the allegation or suspicion. If it
is a student being investigated, The Dean of the School he belongs to
must be part of this team. If it is a member of staff being investigated,
the Deputy Vice Chancellor must be part of this team.
ii. The Director of the Directorate for ICT, Quality assurance and Library
Services will temporarily suspend or block access to an account, prior to
the initiation or completion of such procedures, when it reasonably
appears necessary to do so in order to protect the integrity, security, or
functionality of University or other computing ICT resources or to protect
the University from liability.
iii. After investigations are complete, the findings will be forwarded to the
disciplinary committee, which will decide whether the suspect is guilty or
not, and which will determine the disciplinary action to be taken.
b) Users who violate this policy may be denied access to University ICT resources
and may be subject to other penalties and disciplinary action, both within and
outside of the University. Violations will normally be handled through the
University disciplinary procedures applicable to the relevant user.
c) Any violation of this policy will attract disciplinary action and be handled
according to the rules and regulations of the University and the Country in which
the act was propagated in.
13
VII.1: PLAYERS
The Directorate of ICT, Quality Assurance and Library services is composed of the
Director, ICT Manager, ICT System Administrator, Support desk manager, Support desk
technician, E-learning Coordinator, Web Master, Librarian and Quality Assurance
Manager.
a) Director
Is responsible for the overall activities of the ICT Directorate and the coordination point
for all external support escalation services. He/she liaises with other units regarding
annual planning of ICT activities; improvements to hardware and software
functionalities; any ICT related acquisitions; all ICT budget decisions; coordination of
ICT Strategy and ICT Policy; daily, weekly and other, tasking of all ICT staff;
coordination with trainers for, and some delivery of, training regarding ICT Policy
related training components.
Reports to the Director and is responsible for all Server activities including Users, data
security (access rights, back ups, antivirus, disaster recovery actioning); LAN
configuration; Internet usage; Email accounts and usage; direction to Support Desk
Manager with ICT Department Manager approval for system additions and changes at
User and non-Server locations; maintenance of the Server based components of any
computerized information systems; coordination with external support escalation
including remote access to Servers by external support escalation entity; requests to
ICT Section Manager for Help Desk staff activities relating to non-Server Systems
Administration activities; keep Users informed of ICT Policy issues and system usage
changes; acquisition requests to ICT Department Manager.
Reports to the Director and is responsible for coordinating all Help/Support Desk
activities and ensuring all users are kept informed of status of Help Desk inquiries; task
and coordinate other Help Desk staff; ensures all ICT support Desk activities are
recorded and updated in the Help Desk Job Register; ensures all help desk problems
causing support resolution delays are documented and reported to Director; coordinates
with external support escalation entities relating to User hardware and locally installed
software both on-site and externally-based support; coordinates with external support
escalation entity, in conjunction with ICT System Administrator and under direction
from the ICT Department Manager, in relation to on-site system administration
activities; maintain ICT Help Desk software and literature libraries; maintain all ICT
asset registers; document all requests for acquisition; coordinate acquisition of
quotations as directed the ICT Department Manager; coordination with trainers for, and
14
some delivery of, training regarding training components relating to operating system,
locally installed software, and hardware usage; receiving, recording and if necessary
actioning Help Desk inquiries when Help Desk Technicians unavailable to do so to
ensure prompt response to inquiries (Mon. - Fri. 8:00 - 17:00 including lunchtimes).
Reporting on a day-to-day basis to the ICT Support Desk Manager and is responsible
for the delivery of user support for computer hardware and locally installed software;
other non-Server system hardware support, ensures receiving, recording and actioning
of Help Desk inquiries to ensure prompt response to inquiries (Mon. - Fri. 8:00 – 17:00
including lunchtimes); maintains Help Desk Job Register; delivers user training.
The development of the UTAMU’s ICT policy is performed by the Directorate of ICT,
Quality Assurance and Library services.
The Implementation and evaluation of the of the UTAMU’s ICT policy is performed by
Directorate of ICT, Quality Assurance and Library services in consultation with the
University management.
The monitoring and reviewing progress of the UTAMU’s ICT policy is performed by
Directorate of ICT, Quality Assurance and Library services in consultation with the
University management.
15