Search
Remote Access Policy
Information Technology
… prone to malware infections, such as peer-to-peer, gaming, and free (untrusted) software downloads. The use of …
https://wmich.edu/policies/remote-access
Undergraduate Scholarship Awarding Policy
Enrollment Management
… to the Office of the Provost with an explanation of why they are late, and why the awards should not be deferred until the next …
https://wmich.edu/policies/undergraduate-scholarship-awarding
General Data Protection Regulation Policy
Information Technology
… disclosure of what information is being collected, why the information is being collected, how the information …
https://wmich.edu/policies/gdpr
Web Accessibility Policy
Policies
… Accessibility Compliance Specialist explaining in detail why compliance is not feasible and how, if exempted from one …
https://wmich.edu/policies/web-accessibility
FERPA Policy
Policies
… the part of the record they want changed, and specify why it is inaccurate or misleading. The University must …
https://wmich.edu/policies/ferpa
Service Animals Policy
Policies
… trained or licensed is not required. 8.5. If I’m unsure why an individual has a Service Animal, what may I ask them? …
https://wmich.edu/policies/service-animals
Research Misconduct Policy
Research and Innovation
… records and evidence not taken into custody and explain why. Provide a finding as to whether research misconduct did …
https://wmich.edu/policies/research-misconduct