Handling WPI Data
It’s difficult to imagine students, educators, researchers, and administrators getting by today without the instant communication and access to information provided by e-mail, the Web, and network file transfers. WPI’s telecommunications systems—its computers, servers, wired and wireless data networks, and phone system—are essential tools for conducting the day-to-day business of the university. Data processing, data storage, and electronic communications technology have made it possible for WPI to more effectively and efficiently perform such essential tasks as registering students for courses, recording their academic progress, and managing the complexities of WPI’s financial data.
All technologies have risks as well as benefits. One of the greatest concerns about the use of systems that store and transmit information electronically is the increased risks that data will be intercepted, stolen, or corrupted; that confidential information will be inadvertently released to those who should not see it; and that individual rights (for example, the right to privacy, the right to remain free of harassment, and the right to control and profit from one’s intellectual property) will be violated.
WPI takes very seriously its obligation to operate its electronic data and communications systems in a secure manner and to carefully safeguard the personal and confidential data it maintains on students and employees. Information Security has developed a host of policies and guidelines that outline procedures that should be followed by members of the WPI community to assure that the university lives up to that obligation. For more information about these policies and guidelines a brochure is available from HR entitled Information Security at WPI or it can be viewed online.Maintained by itweb
Last modified: Aug 29, 2008, 09:38 EDT