P.I.T. Information Technology Purchasing Policy
January 21, 2009
Purpose:
The purpose of the policy is to coordinate purchasing activities for hardware, software and services related to any computing applications at P.I.T. The policy is intended to ensure:
1. The necessary computer hardware, data handling facilities and/or software that will be required for any computer related application will be available and working by the time it is needed.
2. Applications installed on College computers, networks or related facilities do not conflict with other College approved and supported applications
3.College resources are maximized by adopting software, hardware and applications that will have use in multiple departments with similar requirements.
The policy cannot anticipate factors beyond any person’s control that may delay the installation and testing of systems. However, cooperation in following this policy will certainly help us all complete those tasks that are in our control.
General Policy:
1. All requirements including detailed specifications for new hardware, software, applications and IT related services must be reviewed and approved by the Chief Information Officer (CIO) of the College. Included in the definition of requirements are requirements for support from the IT department. (It is recommended that a representative of the IT department be involved as early as possible in discussions of requirements and discussions with outside vendors who may supply the required items.)
2.All proposals from vendors for hardware, software or services must be reviewed and approved by the CIO before a request for purchase can be processed.
3.All purchase requests for hardware, software or IT services using funds under the control of the College must be approved by the CIO and the College President. Purchase requests that do not comply with items 1 and 2 above may not be approved.
Additional Policies for Academic Purchases:
All hardware and/or software that is new for a class (not currently installed), and is to be installed by the IT department, must be delivered to the IT department 10 working days prior to the start of the class in which it will be used.
To assure timely delivery of hardware and software, purchase orders must be executed 45 days prior to the start of the class in which it will be used. This requirement includes completing the necessary purchase orders, obtaining approvals for purchases and the placement of the order with the chosen supplier.
The detailed requirements and specifications for hardware and/or software required for a class must be available for review by the IT department 60 days prior to the start of a class. The IT department will be able to review the requirements and provide recommendations for the items to be purchased and suppliers to provide quotes for the purpose of purchasing requirements.
Computer Use Policy
Computer And Communications Tools Usage Policy
Pennsylvania Institute of Technology
Scope of This Policy
This Policy applies to the Pennsylvania Institute of Technology, and anyone using communications tools owned or otherwise utilized by this Institution (such as e-mail, the Internet or an intranet, voicemail, telephones, copiers or scanners and fax machines) and the usage of the tools at any time, whether in or out of the office, and during or after regular school/work hours. This policy applies to all of P.I.T. employees, students and all persons authorized by the Institute to use its communications tools.
Usage of P.I.T. Communications Tools
P.I.T. encourages students to make effective and efficient use of communication and learning tools, such as e-mail and Internet connectivity. Employees are encouraged to use (in addition to the above); voicemail, telephones, copiers and fax machines for the same purposes.
The Institute will allow the use of said tools for personal activities, providing that this use has no adverse effects on the productivity and work environment of others, and does not violate the guidelines established within this document. In all cases, the usage of Pennsylvania Institute of Technology’s communication and learning resources is subject to the discretion of the management. Employees should direct any questions about usage to their manager. Students should direct questions to the IT Director or their instructors
Inappropriate Use of Communications Tools
Employees may not use Institute-owned communication tools for inappropriate purposes. Whether a purpose is inappropriate rests with the discretion of management. Inappropriate use of Institute-owned communication tools, includes, but is not limited to, usage that:
1. Causes sending of unsolicited or “large group” emails (Spamming)
2. Improperly discloses confidential or proprietary information
3.Furthers unethical, immoral or illegal purposes
4. Amounts to threatening or offensive conduct, such as:
a. Accessing, forwarding, and/or photocopying inappropriate items, including, but not limited to, pornographic, sexist, racist, or other such material (e.g., photos, drawings or jokes)
b. Making derogatory or vulgar statements regarding sex, race, color, national origin, ancestry, citizenship, religion, age, physical or mental disability, medical condition, sexual orientation, veteran or marital status
5.Conducts business activities not related to P.I.T.
6.Exceeds reasonable use for non-P.I.T. activities causing an interference with work productivity or more than nominal cost to the Institute
7.Violates any other Institute policy (solicitation, copyrights, trademarks, etc.)
8.Allows a person other than a P.I.T. employee or an individual authorized by P.I.T. to use the Institute’s communications resources
Any employee or student using P.I.T. owned communication tools inappropriately will be subject to disciplinary action, up to and including termination or dismissal/expulsion.
Expectation of Privacy
The privacy of e-mail and Intranet/Internet usage is subject to P.I.T.’s appropriate business and operating needs, Institute policies, and applicable laws. Pennsylvania Institute of Technology operations and network staff may access e-mail in the course of normal systems maintenance, network administration or problem resolutions. In addition, management may authorize the monitoring of e-mail usage to investigate inappropriate use or illegal activities. Depending upon the circumstances, this may involve the reading, decryption, and/or disclosure of e-mail messages. Similarly, as part of standard computer systems administration, the Institute keeps logs of Internet usage activity that may be used by authorized personnel to investigate performance concerns, security incidents (i.e., network/system intrusions, inappropriate use or virus attacks), or for other business purposes
Guidelines for Violations of Corporate Policy
I. Sending or accessing extreme material
Extreme Material is considered to be:
1.Child pornography of any type
2.Material that advocates violence toward others
3.Material depicting human beings engaged in sexual activity
Sending Extreme Material May Result in Termination or Expulsion.
Accessing Child Pornography on the Internet May Result in Termination or Expulsion.
Accessing Violent or Sexual Activity Material on the Internet Will Result in Termination if a Past Pattern of Such Behavior is Demonstrated.
If such a pattern (usually 3 or more instances) is not demonstrated, then the conduct will be subject to the two-step disciplinary process described in Section II below.
NOTE: If the file involves child pornography or violent material, the file will be reviewed for possible referral to an outside agency.
II. Sending or Accessing Offensive Material
Offensive Material is Considered to be:
1.Material depicting exposed male or female bodies
2.Material that creates a hostile work environment (e.g., material with a negative relation to sex, race, age, color, national origin, ancestry, citizenship, religion, disability, sexual orientation, marital status).
Sending or Accessing Offensive Material Will Result in the Following Two-Step Disciplinary Process:
First Offense:
Written warning given to employee and included in the employee’s file. A possible negative impact on the employee’s rating and/or compensation (depending on the severity of the offense) may now result. The warning letter should be given to the employee immediately upon completion of the investigation, and it is the responsibility of management, after consulting with the President, to insure that any adverse rating or compensation action is considered at the next rating cycle.
Second Offense:
Evaluation
III. Receiving Offensive Material Via E-mail
Receipt of Inappropriate Material by an Employee/Student Will Result in a Policy Reminder.
Student or staff member is to be contacted immediately upon discovery of offensive material, and given the appropriate warning.
Employees or students found to be receivers of Extreme or Offensive material should be given a standard written reminder of the Institute’s policy on this matter. This reminder will include suggestions for discouraging the sending of such material in the future, as well as appropriate actions they can take. Suggested actions include:
1.Responding directly to the sender with a request to cease sending such material
2.Reminding any P.I.T. employee/student who is sending such material that this is a violation of the school’s policies and must cease.
3.A meeting directly with their immediate supervisor or counselor to inform them of the situation
Repeated non-compliance with the above guidelines could result in disciplinary action.
NOTE: All P.I.T. employees and students should discourage individuals from sending them inappropriate material.
Summary of disciplinary actions to be taken:
1st Violation of Policy – Written or verbal warning
2nd Violation of Policy – Temporary Disabling of computer accounts and recommendation of disciplinary action
3rd Violation of Policy – Removal of account and recommendation for disciplinary action/suspension
Exceptions to the Disciplinary Guidelines
Any exceptions to the disciplinary approach defined in this document need to be approved by the President of the Institute.
P.I.T. Evacuation Policy
Identification / Notification
In the event of fire or smoke, activate the building fire alarm system to evacuate the building. Even if the fire is small, the alarm should be activated immediately as the fire could grow very quickly. All building occupants should be familiar with fire alarm pull station locations.
Evacuation
The primary concern in the event of a fire is the safe evacuation of the building. To accomplish this, all occupants must be prepared for a quick and orderly evacuation. All occupants should know primary and secondary evacuation routes. Periodic drills and/or meetings should be held to review these procedures. When the fire alarm sounds, immediate evacuation is required.
When evacuating the building, turn off any ventilation equipment, leave the room, turn off lights, and close the door behind you. Evacuation should be calm and safe. To prevent accidents, evacuees should leave by walking in a single file. If you encounter someone who is confused or unaware of the evacuation, usher them outside. Once outside, move away from the building. All evacuees should meet adjacent to the flagpole in front of the school.
NEVER ATTEMPT TO RE-ENTER A BURNING BUILDING.
Responsibilities
It is the responsibility of instructors to ensure students comply with evacuation procedures. Instructors shall secure their attendance sheets and escort students outside, closing all classrooms as they leave. Upon a safe evacuation to the front of the school, Instructors will compare attendance and ensure their students are all present. Attendance will then be submitted to the P.I.T. Administration. P.I.T. Administration will then relay this information to an officer on scene.
Students should NOT be allowed to leave their class group until everyone is safe. Students may leave only when everyone has been accounted for. The P.I.T. administration must authorize this departure and the police and fire department must agree. Students authorized to leave must do so calmly to ensure pedestrian and fire official safety.
Notification and Evacuation Procedures
Upon request, the ITS Department will assist departments in developing evacuation procedures and alternative emergency escape routes to be utilized by building occupants. This information should be posted in conspicuous locations throughout each area for easy reference by building occupants. The evacuation plan should be practiced twice a semester.
P.I.T. Administration to be notified that all the students are safe and accounted for:
John Strayer – President
Jack Bacon – Chief Information Officer
Donna Fabrizio – Dean of Student Services
Robert Hancox – Dean of Academic Affairs
Dispatched Companies
Rose Tree Fire Company - 73
Media Hook and Ladder Fire Company - 23
South Media Fire Company - 51
Springfield Fire Company - 44
Newtown Square Fire Company - 41
Ambulance, Medic 23
Medic 104-7