Search
Minors On Campus Policy
Policies
… care, custody, and control. This Policy sets forth the ways in which University Programs should interact with … One-on-One Interaction: Personal, unsupervised interaction between any Authorized Adult or Program Staff and a … medical or behavioral problems, natural disasters, or other significant program disruptions. Transportation of Minors …
https://wmich.edu/policies/minors
Digital Millennium Copyright Act Compliance Policy
Information Technology
… or performing copyrighted works without permission Designated Agent : the individual designated by WMU to … law to address important parts of the relationship between copyright and the internet Full Policy Details WMU … Describe the material that is claimed to be infringed upon and provide sufficient information to permit WMU to …
https://wmich.edu/policies/copyright
Prior Approval Request Policy
Policies
… Prior Approval form to make allowable changes. Depending upon the awarding agency, Expanded Authority may allow … may include no-cost extensions, re-budgeting of 10% or less between direct cost categories, carry-forward of unobligated … - 12:00pm Thursday, February 1, 2018 - 11:55am Revised Betty McKain Director, Grants and Contracts Office of …
https://wmich.edu/policies/prior-approval-request
Dual Use of Research Concern Policy
Policies
… of this Policy is to lay out the processes that make up the institutional review and oversight by Western … or technologies that could be directly misapplied to pose a significant threat with broad potential consequence to … project. The project will be assessed for: 4.2.3.1.1. The ways in which knowledge, information, technologies, or …
https://wmich.edu/policies/dual-use-research-concern-policy
Telecommuting/Hybrid Work Schedules Policy
Policies
… within a work-day, varying work-day start/end hours between 7 am and 5:30 pm, while maintaining core hours of 9 … work remotely up to one day per week. Geographic Position Assignments: Position assignment at a particular geographic … that is available to all Eligible Employees and in no way changes the standard employment policies and other …
https://wmich.edu/policies/telecommuting-hybrid-work-schedules
Organizational Changes of Academic Units for Curriculum Review
Policies
… dean(s), and distribute agendas and minutes in the standard way. The recommendation from the CCC(s) is reviewed by the … and to the Board of Trustees. The Board of Trustees, upon the president’s recommendation, grants final approval. …
https://wmich.edu/policies/organizational-changes-academic-units-curriculum-review
Alcohol on Campus
Policies
… functions Alcohol may be served, but not sold in any way, at the following designated areas, Sprau Tower (10th floor), Walwood Hall … Center, The Seelye Center, Dalton Center, and specific designated areas for football games. Any other areas on campus …
https://wmich.edu/policies/alcohol
Whistleblower Policy
Policies
… discipline, firing, salary reduction, or job or shift reassignment. 3.4. Anonymous: Person whose name is unknown or … Collective Bargaining Agreements: A written legal contract between an employer and a union representing the employees. … appropriate by the University, which may include discipline up to and including termination from the University. 4.6 …
https://wmich.edu/policies/whistleblower
Conflict of Interest, Anti-nepotism, Gifts - Employee
Policies
… public and shall ensure that they have no conflicts between their duties to the University and their outside … or advancement arising out of University business. 3.3. Designated University Official: the next higher administrator … appointment. This language shall not be interpreted in a way that is inconsistent with any collective bargaining …
https://wmich.edu/policies/conflict-interest-employee
Using Mobile Devices to Store or Access University Information Policy
Information Technology
… The password must be as strong as your device will support. Learn more about creating strong passwords . Enable … A mobile device is any type of device that is designed to be moved and is capable of collecting, storing, … and the information they contain. The most effective way to secure confidential data is not to store it on mobile …
https://wmich.edu/policies/mobile-devices-store-access