Home

Requesting Security Access

Security Access Policies

Request for Security Access Forms

Security Officers
    

University Security Access Policies


As an end user with security privileges to one or more student information management systems, you will have access to view and/or modify an extensive amount of information pertaining to WMU faculty, staff, and students. As a user entrusted with access to this data, you are to familiarize yourself with, and agree to abide by, these policies. Your signature on the access request form stipulates you are familiar with, and will follow, these policies.

Confidential Information Policy for Employees of Western Michigan University governs the disclosure of confidential information held in any manner or format by employees of Western Michigan University. http://www.wmich.edu/hr/handbook-conduct

Family Education Rights and Privacy Act (FERPA) is a federal law that governs and protects students’ rights recarding their individual education records. http://www.wmich.edu/registrar/policies/ferpa/

Freedom of Information Act (FOIA) governs requests for data from outside Western Michigan University and is administered by the FOIA officer in the general counsel’s office. http://www.wmich.edu/gc

Health Insurance Portability and Accountability Act (HIPAA) requires Western Michigan University to provide a Notice of Privacy Practices describing how health information about you that is maintained by the Western Michigan University Group Health Plan may be used or disclosed. http://www.wmich.edu/sites/default/files/attachments/u368/2014/hr-hippa-privacy-practices.pdf

Identity Theft Prevention (Red Flag Rules) is a regulation set forth by the Federal Trade Commission (FTC) to reduce the risk of identity theft. http://www.wmich.edu/registrar/extra/security/Identity%20Theft%20Prevention%20Document%200609.pdf

Social Security Number protection policy
Social security number field in SIS (Banner) is masked. Only personnel who need access to this field as a function of their duties are granted access. The policy document explains responsibilities in detail. http://www.wmich.edu/hr/manual-socialsecurity

WMU Policy on Using Mobile Computing Devices is necessary to protect the confidentiality, availability, and integrity of Western Michigan University and university affiliates’ information while stored, transmitted, or process on mobile computing devices or personal digital assistant (PDA) devices. http://www.wmich.edu/it/policiesmobilecomputing