Search

Password Policy

Information Technology

… significant impact on University operations. This policy does not apply to password-protected files, encryption key … 3.2. Kerberos is an authentication protocol that allows network users to prove their identity to one another in a … See Establishing a password guidelines web page. 8.3.  How long is my password valid? Answer: Passwords for …

https://wmich.edu/policies/password

Facilities and Spaces Naming Policy

Policies

… Business and Finance, Development and Alumni Relations, and donors.  3. Key Definitions  Facility.   A facility is … Naming opportunities are generally reserved for donors; however, an individual’s name may be affixed to a facility, … the cost of renovations.  Whom should we contact about working with donors? A: Please contact the Vice President of …

https://wmich.edu/policies/facilities-spaces-naming-policy

Honorary Degree Policy

Policies

… contribution to society.  Nominees need not be alumni, however, alumni and others with a momentous connection to … categories of honorary degrees that may be conferred: 4.4.1 Doctor of Humane Letters, honoris causa (L.H.D.), given to … describe, in detail, the accomplishments of the candidate, how these accomplishments exemplify the mission of the …

https://wmich.edu/policies/honorary-degree

Digital Millennium Copyright Act Compliance Policy

Information Technology

… assert are improperly posted through the University’s networks.  Key Definitions Copyright infringement : violating … right contained in a copyright; reproducing (to include downloading), distributing (to include file-sharing), or … (files, programs, songs, videos/movies, etc.).  Sharing or downloading copyrighted material without the copyright …

https://wmich.edu/policies/copyright

Freedom of Information Act (FOIA) Processing

Policies

… Freedom of Information Act (FOIA) Processing Policy number 11-02 … than $50.00, or in situations where more than two hours of work is necessary to respond to a FOIA request, would result … is required to disclose all non-exempt public records. However, you are encouraged to work closely with OGC to help …

https://wmich.edu/policies/foia-processing

Service Animals Policy

Policies

… 3. Key Definitions  3.1 Assistance Animal : any animal that works, provides assistance, performs tasks for the benefit … and Emotional Support Animals. 3.2 Controlled Space : any indoor area owned or controlled by the University; any outdoor area owned or controlled by the University on which it …

https://wmich.edu/policies/service-animals

Portable Storage Device Policy

Information Technology

… of the Privacy Rules. Accordingly, the University adopts the following procedures regarding the use and … and laptop computers.  Process: All members of the workforce shall follow the measures set forth below when … device and/or laptop computer only if it is essential to do so to accomplish the work of the university. …

https://wmich.edu/policies/portable-storage-device

Microbiological Safety and Security Policy

Policies

… govern teaching and research involving potentially hazardous microbial agents and/or their products to ensure the … stipulates that the University’s biosafety program has adopted the biosafety procedures and guidelines described in … who requires access to a laboratory and is engaged in work covered by the microbiological safety and security …

https://wmich.edu/policies/microbiological

Signature Authority on Grants and Contracts

Policies

… changes Placed policy into template. Signature authority dollar amount increase.   Current procedures articulated. 1. … research or scholarly activity that has a defined scope of work and/or set of objectives, which provides a basis for … submitted. The proposal then becomes a part of the grant document either directly or by reference. 4.3 Under the …

https://wmich.edu/policies/signature-authority-grants-contracts

Research Export Control Policy

Research and Innovation

… to research and research-related activities. This policy does NOT pertain to business or financial transactions under … to be aware of and comply with the law relative to their work, students assisting them in their work or research, … where the person is a resident or a citizen. Examples of how such technology may be released for export are: 3.2.1. …

https://wmich.edu/policies/research-export-control