Policies

IT Services maintains certain plans, notices, and standards of practice for use of university IT resources.

Draft Policies

These policies have not yet been approved for publication, and are not considered in effect. If you have any questions or concerns about these policy drafts, let us know how we can help.

Acceptable Use
Last modified on September 16, 2020

University faculty, staff, emeritus faculty and staff, registered students, alumni, and approved guests, contractors, consultants are permitted to use computing and networking services, but are subject to the terms of this policy during that use.

Cloud Services
Last modified on September 16, 2020

The purpose of this policy is to ensure that UA Little Rock protected or sensitive data is appropriately stored or shared using public cloud computing and file-sharing services.

Email and Digital Communication
Last modified on September 16, 2020

This policy establishes standards for the electronic transmission of sensitive data and the controls that the users will employ to protect the security and privacy of sensitive electronic data.

Security and IT System Access
Last modified on September 16, 2020

UA Little Rock is committed to safeguarding the confidentiality, integrity, and availability of all physical and electronic information assets of the university to ensure that regulatory, operational, and contractual requirements are fulfilled. To achieve this purpose, this policy complies with federal and state laws and regulations, related standards, and security frameworks.

Current Policies

These policies have been approved and currently apply to all university IT resources.

Acceptable Use
The Information Technology (IT) Acceptable Use Policy for Faculty, Staff and Students ensures the integrity, reliability, and performance of UALR IT Systems and network; ensures that the UALR community of IT Users utilize the campus IT facilities in a fair and equable manner with respect for the rights of the community at large; and ensures that IT Systems and network are used for their intended purposes.
Accessibility
The Accessibility Policy ensures that all information on university websites, web pages, and web-based systems, including online course material, must be accessible to persons with disabilities. Communication should be—to the extent possible—as effective for persons with disabilities as it is for persons without disabilities.
Business Continuity
The Business Continuity Plan integrates business risk management, operational risk management, and business continuity. The plan recognizes a tiered approach to ensure the university is managed during a disaster that renders the technical infrastructure inoperable for a period exceeding two days.
Cabling & Wiring
The Infrastructure Cabling and Wiring Standards inform and guide university staff, consultants, contractors, and third-party personnel involved in any actions affecting or impacting telecommunications and critical physical network infrastructure. These standards are intended to increase the value of our infrastructure by reducing the labor expense of maintaining systems, by extending the useful economic life of systems, and by providing effective service to our users.
Copyright infringement is the act of exercising, without permission or legal authority, one or more of the exclusive rights granted to the copyright owner under Section 106 of the Copyright Act (Title 17 of the United States Code). It is a violation of university policy for students, faculty, or staff to commit copyright infringement using university resources, including any campus or residence hall networks.
Freedom of Information
The university maintains computer databases and files necessary to process student records, registration, and financial aid. These databases are maintained by IT Services. For more information, contact the Associate Vice Chancellor for Information Services at 501-916-3010. This information is intended to comply with the Arkansas Freedom of Information Act codified at ACA 25-19-108.
Network Security
The Network Security Policy is an appendix to the Acceptable Use Policy and presents guidelines for using university systems in a responsible and ethical manner, as well as behaviors and practices that are prohibited.
Privacy
In addition to related laws and regulations, the university Privacy Policy governs how the university collects and maintains electronic information and files from users.