- GC Information Security Program
- Change Management Control Documentation
- Data Breach Notification
- Faculty & Staff Computer Refresh Guidelines
- HEOA Compliance Procedures
- IT Access Controls Documentation
- IT Contract Requirements
- New Faculty & Staff Account Creation
- PCI Data Security Standard
- Student Complaint Procedures
- DNS Procedures Documentation
- Infrastructure and Security Committee
- Data Governance, Admin Systems and Banner Committee
- Academic Technology Committee
IT professional staff members are responsible for evaluating, testing, installing, maintaining, and documenting all software and operating systems that are installed in the University computer labs, electronic classrooms, mobile computer carts, and loaner laptops. (Referred to as lab computers from this point forward unless specified)
Specialized Software installation requests
In order for specialized software to be installed in computer lab computers faculty should follow and be aware of the following procedures and processes.
- Faculty members are to provide Serve with (1) license information regarding the software (2) a copy of the software installation media, (3) and installation instructions no later than 45 days prior to the start of the fall, spring, or summer semester. Serve will maintain a copy of the license information and software installation media. Software purchased using a PCard and freeware software will need to be provided to Serve by the faculty member.
- IT staff will install, test, and document the installation of the software on a computer designated as a testing computer. IT staff members will ensure that the software does not conflict with any other installed software. Faculty will be contacted during the 45 day period and asked to test the software application in order to ensure that it will work properly for his/her class.
- If the application testing is successful it will be installed on the computer lab computers prior to the beginning of the semester. IT staff will contact the instructor and/or department if there are problems.
- Pre-existing specialized software will be automatically installed in lab computers every semester until the faculty member requests that it be removed or the license has expired for the software, if applicable. Faculty will not have to request the re-installation of same specialized software every semester unless and updated version is available and needed.
- The faculty member that initially requested the software installation and the faculty member's department chair will be the contacts if the IT staff needs to consult with the faculty member regarding the software.
- Faculty should contact, Ed Stanley, prior to considering using or purchasing software that he/she intends to use in a computer lab computer. Software purchases must be approved by the IT department. Proper licensing should be purchased to insure that software will be installed on every computer requested to have software installed for example the entire computer lab or instructor station. IT staff will be able to assist with decisions regarding software purchases.
- If a faculty member requests that specialized software be installed after the 45 day testing period or during the semester, IT staff may not be able to accommodate the request in a timely manner.
- A list of installed software will be posted in the computer lab.
Specialized software updates and upgrades
- Software updates are patches or additions to pre-existing specialized software. If IT Staff learn that updates have become available for specialized software, the IT staff will inform faculty that there are updates available. The IT staff member will install the update(s) on a test computer so that the faculty member can test the software. If the faculty member and the IT staff member agree to install the update(s), the IT staff will install the update on the lab computers. Depending on the complexity of the update and the limited access to computer labs, it may take up to two weeks to install the update(s).
- Software upgrades are new versions of pre-existing specialized software. If a software upgrade is made available the Specialized Software installation request must be followed.
Software and Operating System Installation Procedures
- Computer lab imaging consists of copying a complete installation of standard and specialized software and operating systems to a lab computer. This process erases all data stored on a computer and replaces it with a clean' image. If any information is erased it will be not be retrievable.
- Lab computers will be imaged prior to the beginning of the fall semester and prior to the beginning of the spring semester. If the need arises the lab computers can be imaged at any time. The IT staff will try to ensure that lab services are not interrupted due to the imaging process.
- The University computer lab image will be updated at a minimum of two times a year. A computer will be setup with the new software image for faculty to test and ensure that specialized and standard software is functioning satisfactorily.
- The IT staff maintains the installation and setup procedure documentation for specialized and standard computer lab software and operating systems. The documentation regarding the system setup will be available to faculty if they request it.
- IT staff will help ensure that all lab computers receive all critical operating system and virus system updates in a timely fashion.
Georgia College continually develops, maintains and improves its information technology (IT) infrastructure and applications to support the creation, storage, modification and sharing of data. These IT systems are essential to the efficient and effective operation of the University. GC, therefore, has a responsibility to institute appropriate safeguards to keep its IT systems and information assets secure. In addition, the University must comply with regulatory requirements that are also designed to keep certain types of data secure and confidential.
The security of IT systems and information assets is dependent on the individuals managing as well as the individuals utilizing such resources. GC is committed to supporting the principles of academic freedom and the free exchange of ideas and the University's information security policies and programs are intended to support those principles while still maintaining an appropriate level of security.
The goals of this security program are to:
- Protect GC’s IT systems and information assets from unauthorized access, alteration, disclosure or destruction.
- Ensure the reliability and availability of the University's IT systems and information assets.
- Ensure the privacy of faculty, staff and student information and that of other University customers or associates.
- Protect the reputation of the University and ensure compliance with federal and state laws and regulations.
- Establish resources and guidelines that allow all individuals within the University community to practice good data stewardship
Information Security & Compliance Officer
Chappell Hall, Room 204C
The purchase of all GC technology equipment, licenses, maintenance, software, or subscriptions regardless of the source of funds, shall be reviewed by the GC Information Technology department. The Vice Chancellor/CIO of the University System of Georgia has delegated "approval authorization" to the GC Chief Information Officer (CIO) for non-state contract purchases up to $50,000 and up to $100,000 for state contract purchases. Purchases over the delegated level must be submitted to the Vice Chancellor's office for approval. To assure sound purchasing, supportability, appropriate pricing and for security of the university's resources, GC requires pre-purchase approval of all technology. There is no minimum allowable independent purchase. Under these guidelines, technology equipment, software over $1,000.00, maintenance, or licenses shall not be purchased with departmental purchasing cards. Technology Support Services will provide assistance with quotes for your eProcurement purchases. Please forward your request to techquote. Quotes provided should be attached to your e-Procurement requisition with Mr. Ed Stanley (ed.stanley) added as an approver. The electronic approval meets audit requirements. IT purchases should be encoded with the designated IT Codes. (PDF)
Items requiring technology approval:
- Desktop, laptop, palmtop, server or tablet computers as parts or as one unit.
- Printers of any variety.
- External or internal computer or laptop peripherals including hard disk drives, optical drives (CD or DVD), network interface cards, port expansion cards (either USB or Firewire).
- Software over $1,000.00. Special approval is provided for software under $1,000.00 - see above.
- Computer services of any kind.
- Networking hardware including access points, routers, hubs, switches, bridges, antennae, keystone jacks, punch down blocks, UPS or battery back up units, generators for computing equipment, fiber optic cables, copper Category 5, 5e or 6 network cables, surge protectors for computer equipment.
Select items valued under $750.00 may be purchased through the Innovation Station and processed through the department chargeback system.
Asset items $750 and under approved for purchase:
iPad (not to exceed 5)
External hard disk drives
Requests to purchase other types of handheld or tablet devices or purchase of five (5) or more iPads will require the Tech Store Manager to consult with the Director of Technology Support Services. This review helps ensure compliance with Board of Regents policies ensuring IT has deemed the best technology is purchased for the desired outcome. After review, items meeting IT approval will be processed through the Innovation Station.
Prior to release to the department, the Innovation Station will process all asset items through Information Technology's Operations, Planning and Budget Office to ensure items are inventoried and tagged to meet asset control audit requirements.
Procedures for purchasing software under $1,000 at the Innovation Station or on your state purchasing card.
The process for software purchases has been updated to our new GC Signatures. GC Signatures provide automation for University business processes. Access to GC Signatures requires your Unify authentication credentials. You can access the process several ways:
- Using Unify using the GC Signatures Service App.
- Using the main page for GC Signatures and selecting the form based on your method of purchase.
- Using this direct form link listed below. Please remember you must be logged into Unify for the link to work without requiring a login.
Innovation Station Purchase Process:
Software, software upgrades, updates or new versions whether downloaded or on physical media under $1,000 available through the Innovation Station may be processed using this approval form: Innovation Station Software Purchase.
University Purchasing Card Process:
Software, software upgrades, updates or new versions whether downloaded or on physical media under $1,000 may be purchased using a University Purchasing Card by completing this approval form: Purchasing Card Purchase Approval and selecting YES to the question Is this a software purchase under $1000?