Search

Using Mobile Devices to Store or Access University Information Policy

Information Technology

… that in the event the device is lost or stolen, a command can be issued so that all data on the device is deleted. … data is not to store it on mobile devices. This can be accomplished by storing sensitive data only on secure …

https://wmich.edu/policies/mobile-devices-store-access

Pay Raises for Faculty and Staff Within Academic Affairs

Provost and Vice President for Academic Affairs

… Board of Trustees. If a position is re-evaluated, the unit can offer a pay increase identical to what is recommended by …

https://wmich.edu/policies/pay-raises-faculty-staff

Student Complaint Tracking and Reporting

Policies

… Complaint tracking template. This template includes aggregate data from that academic year on the number and … requirements for accreditation are not optional and can result in actions being taken against the University. … informed of a particular problem and respond, the Ombuds can help identify what office should be contacted. 8.3.  …

https://wmich.edu/policies/student-complaint-tracking-reporting

Digital Privacy Policy

Policies

… These tools use cookies to track user sessions so that they can collect data about how users arrive at and navigate the …

https://wmich.edu/policies/privacy

Remote Access Policy

Information Technology

… requirements exist for remote work: The machine/device can be trusted. This means that the machine/device must be …

https://wmich.edu/policies/remote-access

Registering with ClinicalTrials.gov Policy

Policies

… Review Board authorization. 3. Key Definitions  3.1  Aggregate Results : Data collected from individual-level … U.S. Law.  This Web site will not include information that can identify the patient.  At most, the Web site will … journal. 5.4.  Failure to comply with CMS requirements can result in a lack of payment for a qualified research …

https://wmich.edu/policies/registering-clinicaltrials

Anti-Bullying Policy

Policies

… 3. Key Definitions  3.1. Bullying. Repeated and/or severe aggressive behavior likely to intimidate or intentionally … the First Amendment.  4. Full Policy Details  4.1. Bullying can take the following forms, but is not limited to: using …

https://wmich.edu/policies/bullying

Course Fee Policy

Provost and Vice President for Academic Affairs

… Necessary instructional materials which are available or can be made available through local commercial channels, … on more than four courses or have class fees in the aggregate total more than $500 shall inform potential …

https://wmich.edu/policies/course-fee

Debarment and Suspension from Sponsored Projects

Policies

… of the WMU. Federal regulations require that formal applicants for grant and contract funds from the federal … (GSA) Excluded parties Listing System (EPLS). A search can be performed at www.sam.gov. 4.1 Responsibilities 4.1.1 …

https://wmich.edu/policies/debarment

HIPAA Privacy, Security, and Breach Notification

Policies

… of unsecured PHI.  The presumption is rebutted if WMU can demonstrate that (1) there is a low probability that the … an impermissible use or disclosure is a breach unless it can be determined through a risk assessment that there is a … or A client file that may contain sensitive information cannot be located. Do incidental disclosures violate the …

https://wmich.edu/policies/hipaa-breach