{"id":777,"date":"2024-12-18T16:48:38","date_gmt":"2024-12-18T16:48:38","guid":{"rendered":"https:\/\/policies.pstcc.edu\/?page_id=777"},"modified":"2025-02-06T18:51:28","modified_gmt":"2025-02-06T18:51:28","slug":"policy-081308","status":"publish","type":"page","link":"https:\/\/policies.pstcc.edu\/?page_id=777","title":{"rendered":"POLICY 08:13:08"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>ELECTRONIC ACCOUNT ACCESS<\/strong><\/h2>\n\n\n<p>This policy is consistent with TBR Policy 1.08.03.00 Digital Identity, Authentication Management, and Access Control (formerly G-051 &amp; G-052) : 1.08.03.00<\/p>\n<p>Purpose<\/p>\n<p>The purpose of this policy is to define the college\u2019s rights and responsibility to protect information transferred and affiliated with local computer use and data contained within the college\u2019s information technology system and resources, as well as the requirements for providing and revoking access to access to a current or former employee\u2019s account by another user.<\/p>\n<p>Scope and Applicability<\/p>\n<p>This policy applies to all individuals who are provided access to another user\u2019s account and\/or data.<\/p>\n<p>Definitions<\/p>\n<p>Account Owner &#8211; the person to whom the account is listed by name<br \/>Administrative account &#8211; accounts with elevated privileges used to gain access to controlled restricted and\/or confidential data<br \/>Email account \u2013 local communication account assigned to students, staff and faculty contained within the college email system<br \/>General User account \u2013 accounts granted to user for access to college applications such as connected computers, Banner and email<br \/>Non-Owner \u2013 anyone that is requesting information from accounts other than their own Policy and User Responsibilities<\/p>\n<p>Pellissippi State respects the right to privacy when using college computer systems and related equipment within the context of local, state, and federal laws and regulations. To facilitate this right, the president of the college must approve any request for access to a current or former employee\u2019s account. Account descriptions and definitions are in Policy 08:13:02 Computer Account.<br \/>Any information requested and subsequently released should be considered confidential, and disclosure of this information to unauthorized individuals could result in legal liability.<br \/>Additionally, if information is discovered through this process that might violate TBR Policy and Guidelines, state law, federal law, etc., the director of Internal Audit must be notified and an investigation may result. Failure to provide information concerning violations of state or federal law could result in an individual being charged as an accessory after the fact to the violation of the law.<\/p>\n<p>User Responsibilities<\/p>\n<p>To gain information about or access to or to inquire within any other owner\u2019s account, the inquiring non owner must complete the appropriate form requesting the account manipulation and provide acceptable justification for account manipulation and information access. The form must be signed by the requesting non-owner and approved by the appropriate supervisor(s) and the president of the college.<\/p>\n<p>Reasons for inquiries in archived file(s) include, but are not limited to:<\/p>\n<ul>\n<li>suspicion of criminal activity,<\/li>\n<li>suspicion of violation of TBR Policy and Guidelines,<\/li>\n<li>employee death or dismissal.<\/li>\n<\/ul>\n<p>If the request for access is approved, the president will in turn transmit the form to theappropriate Information Services staff. Upon approval, the owner, if an active employee, has the right to be notified by the college of the inquiry activity and the reason for which it was requested. Exceptions to this notification might exist in the case of potential obstruction of any investigation. The president of the college or the TBR Office of General Counsel must approve all exceptions to the right of notification. Information Technology, upon gaining the required approvals and making appropriate notifications, will take any necessary steps to provide the requested information and will maintain a file of all requests granted.<\/p>\n<p>Requests made by individuals not affiliated with the college must also adhere to Policy 06:27:00 Inspection And Copying Of Public Records. Additionally, when a request is made, a reasonable charge for providing the information may be assessed to the requesting non-owner.<\/p>\n<p>Approved: President Allen G. Edwards, February 10, 2003<br \/>Approved: President\u2019s Staff, June 6, 2005<br \/>Reviewed\/Recommended: President\u2019s Staff, April 16, 2007<br \/>Approved: President Allen G. Edwards, April 16, 2007<br \/>Reviewed\/Recommended, no changes, President\u2019s Council, November 25, 2013<br \/>Approved: President L. Anthony Wise, Jr., November 25, 2013<br \/>Reviewed\/Recommended: President\u2019s Council, September 9, 2019<br \/>Approved: President L. Anthony Wise, Jr., September 9, 2019<br \/>Reviewed\/Recommended: College Council, January 27, 2025<br \/>Approved: President L. Anthony Wise, Jr., January 27, 2025<\/p>","protected":false},"excerpt":{"rendered":"<p>ELECTRONIC ACCOUNT ACCESS This policy is consistent with TBR Policy 1.08.03.00 Digital Identity, Authentication Management, and Access Control (formerly G-051 &amp; G-052) : 1.08.03.00 Purpose The purpose of this policy is to define the college\u2019s rights and responsibility to protect information transferred and affiliated with local computer use and data contained within the college\u2019s information [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"policy-template-1","meta":{"footnotes":""},"class_list":["post-777","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/policies.pstcc.edu\/index.php?rest_route=\/wp\/v2\/pages\/777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/policies.pstcc.edu\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/policies.pstcc.edu\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/policies.pstcc.edu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/policies.pstcc.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=777"}],"version-history":[{"count":3,"href":"https:\/\/policies.pstcc.edu\/index.php?rest_route=\/wp\/v2\/pages\/777\/revisions"}],"predecessor-version":[{"id":1124,"href":"https:\/\/policies.pstcc.edu\/index.php?rest_route=\/wp\/v2\/pages\/777\/revisions\/1124"}],"wp:attachment":[{"href":"https:\/\/policies.pstcc.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}