Skip to main content

Fitchburg State uses technology to gather information and better understand visitors’ experiences. By continuing to use this website, you consent to this usage in accordance with our Privacy Policy.

Tablet Policy

This policy is to guide users in the acceptable use of tablet computers at Fitchburg State University.

Scope

This policy applies to any users who are granted access in any way to Fitchburg State University electronic resources utilizing tablet computers. It should be considered as complementary to applicable Commonwealth and Federal law and other Fitchburg State University polices, such as the Acceptable Use of Technology Resources and Electronic Mail Services policies.

Summary

With the introduction and growth of tablet computing, opportunities for users to be productive, access data and communicate effectively has increased tremendously. These increased abilities also mean there are more opportunities for data to be stolen, lost or inadvertently exposed and a baseline of security must be applied to minimize this risk.

By using these electronic resources you assume personal responsibility for their appropriate use and agree to comply with this policy, other applicable University policies as well as Commonwealth and Federal laws and regulations.

Initial Purchase and Refresh

Purchase

  • Tablet systems must be either iOS based (such as the Apple iPad) or Android based (such as the Motorola Xoom, Acer Iconia, Toshiba Thrive, etc.).
  • Departmental funds must be used to purchase these unless they are a personally-owned device.

Software purchase

  • Any work-related applications must be purchased with departmental funds.
  • Backups of these apps are the responsibility of the user.
  • If a device is remotely wiped, be aware you may lose personal data or purchased applications.

Refresh

  • These systems are considered complimentary to the laptop or desktop system already supplied by the University. No systems will be refreshed utilizing IT funds.

Required Settings

  • A password must be used upon boot up and before accessing any systems.
  • Passwords must not be stored but must be entered each time accessing remote desktop software.
  • Any work-related data stored must be encrypted – even if it’s on the cloud.
  • Device must automatically lock after 10 minutes of non-use.

Policy Administration

The University may restrict the use of its computers and network systems when presented with evidence of violation of University policies, or federal or state laws, or when it is necessary to do so to protect the University against potential legal liability. The University reserves the right to limit access to its information technology resources, and to remove or limit access to material stored on University technology resources.

All users are expected to conduct themselves consistent with these responsibilities. Abuse of computing privileges may subject the user to disciplinary action as established by applicable University policies.

  • Students who violate this policy may be subject to discipline and will be referred to the Office of Student Conduct, Mediation and Education.
  • Represented employees may be subject to discipline in accordance with the applicable collective bargaining agreement.
  • All others may be subject to discipline determined by the President.
 

Chat with our team

Have questions?
Chat with an expert!
CHAT WITH AN EXPERT

New Chat