Search
Password Policy
Information Technology
… significant impact on University operations. This policy does not apply to password-protected files, encryption key … 3.2. Kerberos is an authentication protocol that allows network users to prove their identity to one another in a … See Establishing a password guidelines web page. 8.3. How long is my password valid? Answer: Passwords for …
https://wmich.edu/policies/password
Facilities and Spaces Naming Policy
Policies
… Business and Finance, Development and Alumni Relations, and donors. 3. Key Definitions Facility. A facility is … Naming opportunities are generally reserved for donors; however, an individual’s name may be affixed to a facility, … the cost of renovations. Whom should we contact about working with donors? A: Please contact the Vice President of …
https://wmich.edu/policies/facilities-spaces-naming-policy
Honorary Degree Policy
Policies
… contribution to society. Nominees need not be alumni, however, alumni and others with a momentous connection to … categories of honorary degrees that may be conferred: 4.4.1 Doctor of Humane Letters, honoris causa (L.H.D.), given to … describe, in detail, the accomplishments of the candidate, how these accomplishments exemplify the mission of the …
https://wmich.edu/policies/honorary-degree
Digital Millennium Copyright Act Compliance Policy
Information Technology
… assert are improperly posted through the University’s networks. Key Definitions Copyright infringement : violating … right contained in a copyright; reproducing (to include downloading), distributing (to include file-sharing), or … (files, programs, songs, videos/movies, etc.). Sharing or downloading copyrighted material without the copyright …
https://wmich.edu/policies/copyright
Freedom of Information Act (FOIA) Processing
Policies
… Freedom of Information Act (FOIA) Processing Policy number 11-02 … than $50.00, or in situations where more than two hours of work is necessary to respond to a FOIA request, would result … is required to disclose all non-exempt public records. However, you are encouraged to work closely with OGC to help …
https://wmich.edu/policies/foia-processing
Service Animals Policy
Policies
… 3. Key Definitions 3.1 Assistance Animal : any animal that works, provides assistance, performs tasks for the benefit … and Emotional Support Animals. 3.2 Controlled Space : any indoor area owned or controlled by the University; any outdoor area owned or controlled by the University on which it …
https://wmich.edu/policies/service-animals
Portable Storage Device Policy
Information Technology
… of the Privacy Rules. Accordingly, the University adopts the following procedures regarding the use and … and laptop computers. Process: All members of the workforce shall follow the measures set forth below when … device and/or laptop computer only if it is essential to do so to accomplish the work of the university. …
https://wmich.edu/policies/portable-storage-device
Microbiological Safety and Security Policy
Policies
… govern teaching and research involving potentially hazardous microbial agents and/or their products to ensure the … stipulates that the University’s biosafety program has adopted the biosafety procedures and guidelines described in … who requires access to a laboratory and is engaged in work covered by the microbiological safety and security …
https://wmich.edu/policies/microbiological
Signature Authority on Grants and Contracts
Policies
… changes Placed policy into template. Signature authority dollar amount increase. Current procedures articulated. 1. … research or scholarly activity that has a defined scope of work and/or set of objectives, which provides a basis for … submitted. The proposal then becomes a part of the grant document either directly or by reference. 4.3 Under the …
https://wmich.edu/policies/signature-authority-grants-contracts
Research Export Control Policy
Research and Innovation
… to research and research-related activities. This policy does NOT pertain to business or financial transactions under … to be aware of and comply with the law relative to their work, students assisting them in their work or research, … where the person is a resident or a citizen. Examples of how such technology may be released for export are: 3.2.1. …
https://wmich.edu/policies/research-export-control