BGSU IT Policies

The IT policies listed on this page have been reviewed and approved by the Cabinet and are officially hosted on the Office of General Counsel's website located here. The policies have also been sent to the state for filing pursuant to Senate Bill 3.

Appropriately Affiliated Members

Those associated with the University through the status of current student, faculty, staff, BGSU retiree, BGSU alumni, active BGSU account holder.

Core Values

The Core Values to which the University adheres include respect for one another, cooperation, intellectual and spiritual growth, creative imaginings, and pride in a job well done.

General Public

Any person not directly affiliated with the Office of the CIO.


Data, in all its forms, collected, maintained, accessed, combined, or modified by and for members of the University community

Information Technology Resource

All aspects associated with management and processing of information. This includes facilities, technologies, and data used for University processing, transfer, storage, and communications. Examples of these resources, include, but are not limited to, computers, networking equipment, telecommunications equipment, electronic mail, electronic information sources, network bandwidth, wireless devices, video communications, IP telephony, University assigned accounts, voice mail, passwords, access controls, storage media, documentation, personal digital assistants.


A configuration of communications equipment and communication links by any wired or wireless means, that enables resources to be geographically separated, while still connected to each other.


PeopleSoft is the company that produces the administrative software application that is being implemented by the BG@100 PeopleSoft project for use as administrative systems at BGSU. The software itself is also referred to as PeopleSoft.

Public Computers

Example of public computers include, but not limited to, airport kiosks, library computers, internet cafes etc.


An inspection or exploration to gain knowledge of a network's topology, configuration or components.

Safe Computing

Using information technology in a secure manner consistent with its intended purpose. Examples of security measures to be taken, include, but are not limited to, the use of strong passwords that are not easily guessable, are changed regularly and are kept private; the application of all relevant security patches in a timely manner; maintenance of up-to-date virus definitions; backup and protection of important/critical data; security of passwords; protection of data and files.

Security Controls

Any procedure or technology that mitigates the risk of unauthorized users from accessing information technology resources, including, but not limited to, firewalls, encryption, policies, and passwords.

Sensitive University Data

Sensitive University Data includes personal information and proprietary information of the University included but not limited to: Social Security numbers, Driver License numbers, credit card or other financial account numbers, BGSU ID numbers, protected health information, financial data, educational records, intellectual property or research records, donor profiles, or any information that could result in a material risk of identity theft, a violation of the Family Educational Rights and Privacy Act, or otherwise harm the legitimate financial and reputational interests of the University if unauthorized access is permitted, whether intentionally or unintentionally.


A method or methodology that applies technical knowledge or tools.

Unlicensed Spectrum Space

Unlicensed spectrum includes the FCC unlicensed 2.4 Ghz Industrial/Scientific/Medical (ISM) band and the 5.1 Ghz Unlicensed National Information Infrastructure (UNII) band.


A user is any person, either authorized or unauthorized, who utilizes information technology resources from any location.

Virtual Private Network (VPN)

A “tunnel” connection created to allow secure communications over public networks.

Vulnerability Scanning

The process of proactively identifying vulnerabilities of computing resources in a network in order to determine if and where a resource can be exploited and/or threatened.  

Related Links

Updated: 07/06/2020 04:53PM