Computing Support and Security
- Reporting Malicious Behavior: If you suspect that a device or user has been affected by malware, you are obligated to promptly contact EMT Security and the Computer Support Team. This should be done by submitting a ticket before directly contacting team members via Teams or email, ensuring tracking and resolution of the issue.
- VPN Usage Requirement: It is mandatory for all devices to utilize a Virtual Private Network (VPN) whenever they are not directly connected to the campus network, including when accessing Slate resources.
- Prohibition of Personal Email Usage: Employees are strictly prohibited from using their personal email accounts on any work-issued devices.
- Restriction on Non-Work Related Website Access: Accessing non-work related websites, including but not limited to online shopping platforms, streaming services, and social media networks, is strictly prohibited on all work-issued devices.
- Software and Application Download Policy: No software or applications are to be downloaded onto work devices without prior approval from the computer support team. To request approval, employees must submit a support ticket.
- New Employee Device Request: New employees needing computer equipment must have a ticket submitted by their supervisor formally making the request with their name, start date, and room number. We will not give out equipment to any employees before their start date designated by HR.
- Partial Telework Eligibility: Employees will not be approved for telework until they have completed their probationary period, which is typically six months of service. Exceptions may be considered under special circumstances. Devices that have not been provisioned by the department are not entitled to access departmental resources or support from troubleshooting experts.
- Ticket Submission Requirement for Access: Instructions for submitting access requests including swipe card, shared drives, row-level, Slate, OnBase, etc., are available at EMT Security Access Request Site. Requests submitted improperly will not be acknowledged.
- Ticket Submission Requirement for Support: Any technical issues must be reported by creating a support ticket. Requests submitted without a ticket will not be acknowledged. In case of emergencies, urgency should be marked as "High." For internet-related issues where a ticket cannot be submitted, please have another employee submit a ticket on your behalf.
Departmental Device Allocation Policy:
Priority for device allocation will be given to users based on their job roles, responsibilities, and operational requirements. Special consideration may be given to critical functions or projects as determined by departmental management.
Users do not have the option to select their preferred device and will be provided with the most suitable device available at the time of request.
Users requiring replacement or upgrades of their computing devices will be accommodated based on the availability of suitable equipment within the department's inventory. Requests for replacements or upgrades will be subject to approval by departmental management.
Laptop Distribution Policy:
The eligibility for laptop allocation will be based on job roles and operational requirements.
Supervisors are responsible for assessing the eligibility of their team members and submitting formal ticket requests accordingly. Please refer to our Computer Support Page for information regarding laptop requests.
Transactional Data Policy:
Employees are prohibited from sharing transactional data via email attachments. Instead, they should save historical records to the shared drive.
Collaboration within the organization or other departments on campus should utilize the Noles File Transfer System (NiFTy) or Teams, with a preference for utilizing queries within the transactional systems for audits or reporting.
External data requests should be promptly notified to the associate director, director, and ES-Info.
FSU Security Policies and Procedures
State and Federal Policies
These policies will be periodically revised to align with organizational objectives and technological advancements.
Thank you for your cooperation in adhering to these policies. These measures are essential for safeguarding our organization's data and assets.
- Enrollment Management Technology Team