The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help

Request Information

Enter Your First Name.
Enter Your Last Name.
Enter Your E-mail Address.
Enter Your Phone Number
Enter Your Date of Birth.
Enter Your Address.
Enter Your City.
Enter Your Zip Code.
Enter Your Gender
Please select an area you are interested in from the dropdown.
choose the semester you plan to enroll at Chattanooga State.
Please submit any other information or inquiries in this box.
    Chattanooga State Technical Community College
   
 
  Sep 21, 2017
 
 
    
Policies

08:17:05 Information Technology Services Computer Access


 

08:17:05 Information Technology Services

Computer Access

 

  1. Introduction:    
    1. Information Technology Services (ITS) is responsible for providing access to computer systems the data stored in them. College students and staff rely on the security of the computer systems to protect instructional, research, personal, operational and other sensitive data maintained in those computer systems. It is essential that these systems be protected from misuse and that both the computer systems and the data stored in them are accessed and maintained in a secure environment.
    2. This document does not waive any claim that the College may have to ownership or control of any hardware, software, or data created on, stored on, or transmitted through College computing systems. Network requirements and standards are covered in another CHSCC policy.
  2. Purpose:
    1. This policy establishes a process and procedure used to request initial computer access and computer set-ups for new employees. The policy is the high level support for all security access requests and the procedures/processes that are used to ensure access is granted only as authorized. The policy establishes access review between data owner and Information Technology Services (ITS) to ensure access is limited to only those individuals requiring access to perform their job duties. This policy also provides support for electronic mail initial set-up, storage limits, and archival of email (non-record.)
  3. Scope:
    1. The scope of this policy includes all full time College staff and faculty, adjuncts, contractors, vendors and student workers.
  4. Access Requests:
    1. There are two separate types of access a new employee might need to perform their job. They include the basic computer set-up and special access set-up. For specific "How to..." procedure and process requirements for all hiring situations and for "How to Request Adjunct Continued ITS Access" please go to the ITS Web Page and click on Access Requests. https://itservices.chattanoogastate.edu/. Access processes for all Banner data requiring special access permissions are also located in the same area. 
    2. Training is required for both.
      1. Basic - Basic computer set-up includes: access to Exchange - CHSCC's email system, TigerWeb and Self-Service Banner access, staff wireless access and standard desktop computer set-up, and/or any required Information Technology (IT) equipment, i.e. desktop, laptop, and/or phones.
      2. Special - If a new employee, or an employee that has changed job, also require special Internet Native Banner (INB) access,  ARGOS reporting capability or BDMS  to fulfill job duties, this type of access must be requested the through the appropriate process located on ITS web site. 
  5. Training Requirements
    1. FERPA training acknowledgement as required by TBR guidelines will be handled through ChSCC Student Services.
    2. New employees should attend the "Introduction to CHSCC Computer Systems" course within 30 business days of hire. Please call the computer training coordinator at ext. 2581 to set up the training.
    3. All employees that work with PCI data will have to take annual PCI training. This training is on-line and requires a specific score on a test before they can start/continue working with PCI data.
  6. Electronic Mail
    1. Electronic Mail (email) is provided to faculty/staff and students through Microsoft Office 365 and is hosted in the cloud environment. ITS does not manage email stored at Office 365 and no emails are archived at an Enterprise level (except those considered records by the individual user - see 5.1.c below.)  
    2. The following are guidelines for email support:
      1. Individual users are responsible for the maintenance of their "cloud" email storage. Recovery of  
      2. deleted emails, managing space, etc., is the responsibility of the individual user. If email is deleted                    
      3. from email account in the cloud, ITS cannot recover the email
      4. Individual users will review ChSCC 08:16 Data Security Policy for details on protection of confidential
      5. data, identifying data, sensitive and/or personal data, or PCI protected data before inclusion within an email.
      6. Social Security Numbers, (SSNs) are never included within an email, unless fully encrypted.
      7. The official cloud hosting site for ChSCC emails is Office 365.
      8.  If an email contains record information and needs to be retained, please consult TBR Guideline G-70,    
      9.  Disposal of Records and your supervisor, advisor or Dean. ChSCC' S record retention system is the BDMS system.
  7. Changing or Removing Access:
    1. Supervisors for employees, contractors, etc., that are leaving CHSCC for any reason,  or are changing jobs within ChSCC  should notify ITS as soon as possible, to ensure security access is removed on the date the employee leaves or changes jobs.  Any user account will be disabled after one (1) year of inactivity.
    2. ITS 08:16 Data Security Procedure provides guidelines to requests for additional access due to an employee changing jobs, receiving a new supervisor, etc., or any change that could impact access requirements will require completion of new forms.  
  8. Changing or Removing Access for Contract Workers:
    1. Anyone on a contract will have access limits set to disable upon last day of the contract, unless action is taken to continue access by supervisor. All vendors that require access must follow the same process for ChSCC employees. Vendor access will be disabled as soon as their work has been completed. For instructions on adjunct continuing access, please go to the ITS web Page, Access Requests https://itservices.chattanoogastate.edu/forms.php.
    2. Any user account will be disabled after one (1) year of inactivity.
  9. Emergency Access Removal:
    1. Emergency access removal requests can only be authorized by employee's Vice President, Vice President of HR, or the President of the College. To initiate the emergency access removal process, notify the Assistant VP of ITS or the Director, Systems Development and Operations. Once notified, requester will be contacted to ensure exactly what needs to take place and when.
    2. Access will be removed upon stated date for emergency access removal. Access to Exchange email will only be disabled initially. Disabling the account allows the supervisor or others, as necessary, to have access to the emails, etc., if required. ITS will work with designated individuals to determine when the email box, etc., can be deleted.  
  10. Special INB Access Reviews:
    1. ITS will contact each individual data owner responsible for approving special access authorizations for access reviews at least annually. Notification received by ITS through official channels concerning personnel changes that impact access will be shared with appropriate data owners to ensure access lists stay current between data owners and ITS.
  11. Access to Forms:
    1. Supervisors can find detailed instructions on initiating access workflow processes by accessing the ITS Web Page and click on Processes. https://itservices.chattanoogastate.edu/.

 

References:

1. State of Tennessee Department of Finance and Administration Office/Office for Information Resources Aug 2007/Apr 2008

2. Tennessee Board of Regents (TBR) Information Technology Policy 1:08:00:00

3. Tennessee Board of Regents (TBR) G-070 Disposal of Records

4. Tennessee Board of Regents (TBR) Guideline G-075 Litigation Hold Notice procedures for Federal Litigation (Federal Rules of Civil Procedure)

                                                                                      

 

 

Approved Rev 5:

President's Cabinet,

 

Approved Rev 5:

Dr Flora Tydings, President,  8/25/2016

 

Reviewed and Revised by: Information Technology Services, 09/30/08
Reviewed and Revised by: Information Technology Services, 03/27/09   No updates required                                                                              

Reviewed and Revised by: Information Technology Services, 06/01/10   No updates required                                                                               

Reviewed and Revised by Information Technology Services, 12/1/2011  Rev 3                                                                                     Reviewed and Revised by Information Technology Services, 05/7/2012  No Updates Required                                           

Reviewed and Revised by Information Technology Services, 05/7/2014 Rev 4   

Reviewed and Revised by Information Technology Services, 11/17/2015 Rev 5

 

Revision 5 Changes

Pages All. Computer Services was changed to reflect new name of Information Technology Services.

Page1. Section - Purpose. Added the following statement, "This policy also specifies electronic mail initial set-up, storage limits, and archival of email (non-record.)

Page 2 Section 4.3 - Payment Card Industry. All employees that work with PCI data will have to take annual PCI training. This training is on-line and requires a specific score on a test before they can start/continue working with PCI data.

Page 2. Section - 5 - Electronic Mail: Complete section was replaced. Office 365 cloud storage was added to replace on-site storage of email and Electronic Vault.

Page 3. Section - 7 - Changing or Removing Access for Contractors. Complete section was added to reference workflow process located on ITS Web Page.

Page 1-5 All Sections - Renumbered due to new sections being added.