Search

Anti-Bullying Policy

Policies

… web pages with a negative focus; posting insults on social networking sites; and/or spreading rumors with malicious … Protected Speech unless such speech meets the definition of workplace harassment set out in applicable …

https://wmich.edu/policies/bullying

Data Classification Policy

Policies

… of policy The Data Classification Policy provides a framework for classifying institutional data based on its level … and/or result in identity theft. Examples include: Social Security Numbers Credit card and financial account … Policy, and/or Regulation Data Classification Social Security Number  Michigan Social Security Number …

https://wmich.edu/policies/data-classification

Confidential Information Policy

Policies

… welcomes public accountability. In the course of their work, staff members have access to information about WMU … Numbers, information system user IDs and passwords, social security numbers, internal communications, banking or …

https://wmich.edu/policies/confidential-information

Office 365/W-Exchange Acceptable Use Policy

Information Technology

… restricted/confidential data, including, but not limited to social security numbers, driver's license numbers, financial …

https://wmich.edu/policies/office-365wexchange

Minors On Campus Policy

Policies

… the University community (faculty, staff, students) who may work or interact with individuals under 18 years of age who … medical care, audiologist, psychologist, counselor, social worker, school administrator, teacher, law … or communicate with Minors through email, text messages, social networking websites, phone, internet chat rooms, …

https://wmich.edu/policies/minors

Fixed-Price Agreements Policy

Policies

… where the contractor pays a firm price for the agreed-upon work, regardless of the ultimate cost to complete the … of agreements because the institution must complete all work, even if there are cost overruns. However, the … any unexpended balance that remains after the contracted work is complete. The Principal Investigator should work

https://wmich.edu/policies/fixed-price-agreement

Political Activities Policy

Policies

… technology resources such as email, websites, or social media; employee time 3.6.   University Sponsor : … or employee who wishes to run for political office or work/volunteer for a partisan political campaign.  These … the University’s electronic resources (including email and social media) for advocacy on behalf of a candidate or …

https://wmich.edu/policies/political-activities

General Data Protection Regulation Policy

Information Technology

… physiological, genetic, mental, economic, cultural or social identity of that natural person. 3.2. Processing Any … 4.3.2. With regard to academic data—including course work attempted and/or completed, as well as grades …

https://wmich.edu/policies/gdpr

Remote Access Policy

Information Technology

… at Western Michigan University using Virtual Private Network (VPN) technology. Learn more about WMU's VPN . … affiliate connecting to a Western Michigan University network using a non-University controlled network, device, or service. A VPN is a secured private network

https://wmich.edu/policies/remote-access

Excess Compensation in Sponsored Programs Policy

Policies

… and Budget: Uniform GuidanceSection 200.430 Charges for work performed on Federal award by faculty members during … of the IBS for the period during which the faculty member worked on the award. 4.3. Intra-IHE consulting by faculty is … lines or involves a separate or remote operation, and the work performed by the consultant is in addition to [their] …

https://wmich.edu/policies/excess-compensation