Search

Remote Access Policy

Information Technology

… prone to malware infections, such as peer-to-peer, gaming, and free (untrusted) software downloads. The use of …

https://wmich.edu/policies/remote-access

Undergraduate Scholarship Awarding Policy

Enrollment Management

… to the Office of the Provost with an explanation of why they are late, and why the awards should not be deferred until the next …

https://wmich.edu/policies/undergraduate-scholarship-awarding

General Data Protection Regulation Policy

Information Technology

… disclosure of what information is being collected, why the information is being collected, how the information …

https://wmich.edu/policies/gdpr

Web Accessibility Policy

Policies

… Accessibility Compliance Specialist explaining in detail why compliance is not feasible and how, if exempted from one …

https://wmich.edu/policies/web-accessibility

FERPA Policy

Policies

… the part of the record they want changed, and specify why it is inaccurate or misleading.  The University must …

https://wmich.edu/policies/ferpa

Service Animals Policy

Policies

… trained or licensed is not required. 8.5. If I’m unsure why an individual has a Service Animal, what may I ask them? …

https://wmich.edu/policies/service-animals

Research Misconduct Policy

Research and Innovation

… records and evidence not taken into custody and explain why. Provide a finding as to whether research misconduct did …

https://wmich.edu/policies/research-misconduct