Search
Using Mobile Devices to Store or Access University Information Policy
Information Technology
… that in the event the device is lost or stolen, a command can be issued so that all data on the device is deleted. … data is not to store it on mobile devices. This can be accomplished by storing sensitive data only on secure …
https://wmich.edu/policies/mobile-devices-store-access
Pay Raises for Faculty and Staff Within Academic Affairs
Provost and Vice President for Academic Affairs
… Board of Trustees. If a position is re-evaluated, the unit can offer a pay increase identical to what is recommended by …
https://wmich.edu/policies/pay-raises-faculty-staff
Student Complaint Tracking and Reporting
Policies
… Complaint tracking template. This template includes aggregate data from that academic year on the number and … requirements for accreditation are not optional and can result in actions being taken against the University. … informed of a particular problem and respond, the Ombuds can help identify what office should be contacted. 8.3. …
https://wmich.edu/policies/student-complaint-tracking-reporting
Digital Privacy Policy
Policies
… These tools use cookies to track user sessions so that they can collect data about how users arrive at and navigate the …
https://wmich.edu/policies/privacy
Remote Access Policy
Information Technology
… requirements exist for remote work: The machine/device can be trusted. This means that the machine/device must be …
https://wmich.edu/policies/remote-access
Registering with ClinicalTrials.gov Policy
Policies
… Review Board authorization. 3. Key Definitions 3.1 Aggregate Results : Data collected from individual-level … U.S. Law. This Web site will not include information that can identify the patient. At most, the Web site will … journal. 5.4. Failure to comply with CMS requirements can result in a lack of payment for a qualified research …
https://wmich.edu/policies/registering-clinicaltrials
Anti-Bullying Policy
Policies
… 3. Key Definitions 3.1. Bullying. Repeated and/or severe aggressive behavior likely to intimidate or intentionally … the First Amendment. 4. Full Policy Details 4.1. Bullying can take the following forms, but is not limited to: using …
https://wmich.edu/policies/bullying
Course Fee Policy
Provost and Vice President for Academic Affairs
… Necessary instructional materials which are available or can be made available through local commercial channels, … on more than four courses or have class fees in the aggregate total more than $500 shall inform potential …
https://wmich.edu/policies/course-fee
Debarment and Suspension from Sponsored Projects
Policies
… of the WMU. Federal regulations require that formal applicants for grant and contract funds from the federal … (GSA) Excluded parties Listing System (EPLS). A search can be performed at www.sam.gov. 4.1 Responsibilities 4.1.1 …
https://wmich.edu/policies/debarment
HIPAA Privacy, Security, and Breach Notification
Policies
… of unsecured PHI. The presumption is rebutted if WMU can demonstrate that (1) there is a low probability that the … an impermissible use or disclosure is a breach unless it can be determined through a risk assessment that there is a … or A client file that may contain sensitive information cannot be located. Do incidental disclosures violate the …
https://wmich.edu/policies/hipaa-breach