Network Infrastructure Policy

Network infrastructure refers to all devices that are connected by wire, optical cables, or wireless to the digital communication networks that are owned and/or operated by the University.

Network Access Management
a) All SIMAD University ICT users shall be required to seek prior authorization from the designated ICT resource owner in order to access t any network systems and resources of the university. Access shall be regulated in accordance with SIMAD University Statutes and the applicable laws. The elements involving access regulation includes identification of the user, approval for the use and safeguarding the ICT resources and facilities

b) SIMAD University’s ICT resources and facilities shall be controlled and managed by ICT experts who shall be authorized staff appointed in accordance with the provisions in the Human resource policy and approved by the SIMAD University Management to oversee the smooth running of the systems and to safeguard their security, reliability, and integrity

c) Any development and improvement on the existing ICT system shall be after prior authorization from the system management and shall use formal, auditable system change control procedures provided by the university ICT department and appropriate risk management measures and precautions adhered to for the safety of all information’s existing In the systems

d) Network Administrator is mandated to make appropriate emergency changes to avert the risk of security of ICT systems, secure and restore network services and make appropriate communications to the affected heads of the organizational units and the Director of ICT services

e) The overall control of the ICT systems shall be managed by the systems and Network Administrator, but can also be delegated to designated system owners for limited specific system operations and management.

Network Access Authorization
a) All staff and students of SIMAD University are entitled to accessing the University network either via wired or wireless connection

b) The students shall only be authorized network access via wired or wireless-connection at fully controlled location such as the computer labs and campus compound

c) The guest of the University shall be allowed network access via wireless connection with restricted usage time, which shall be applied by the guest him/herself or by the respective Office

d) Request for network services apart from clauses a, b and c shall be forwarded to ICT Director for approval with the recommendation from deans and directors

e) The University ICT Director upon receiving reports on evidence of security threats to the ICT systems reserves the right to suspend or revoke the network connections of ICT users to safeguard the ICT system and this shall be done in accordance with the provisions of the policy

Identification
a) All SIMAD University ICT resource users shall be assigned unique identifiers (ID) (i.e. Username/PIN and passwords) for accessing and logging into the University’s systems, facilities and applications

b) ICT resources User IDs (i.e. Username/PIN and passwords) shall be unique for every user and shall not be shared for the specific identifications of users in case of determining the specific user for various reasons that may arise

c) The responsibility of maintaining the security and safety of the user IDs shall be fully on the user and the university shall not be liable for any loss or malpractices in connection to individual accounts

Authorisation
a) All SIMAD University ICT resource users shall be required to seek prior authorization to access and use any ICT resources or facility by submitting a written request to the authority who upon the request consideration and approval shall in writing give the feedback to the designated ICT resource owner or head of department for implementation

b) ICT resource and facilities Users shall safeguard and avoid disclosure of any information threatening to compromise the security of SIMAD University’s ICT resources and facilities
c) SIMAD University resource user shall not disguise or use someone else not identity when obtaining authorization to access or use University ICT resources

Authentication
a) All SIMAD University resource and facilities users shall require Authentication involving an identity. Each account shall require a unique password and the two must match for validating user’s identity
b) Provided guidelines and Standards shall apply to all ICT systems that require authentication

Account Management
a) All ICT resource users shall seek authorization for account access and use from the designated owner of the ICT resource. In such instances, the granted permission must specify the level of system access

b) The Network System administrator shall regulate all network access of the University including the remote areas specifically through the university (Virtual Private Networks) VPN when there is justifiable need to do so and subject to approval by the university management upon written request

c) There shall be quarterly ICT system access levels review and reports from the reviews submitted to the ICT Director on actions and measures needed to safeguard the ICT systems and accounts

d) Upon termination of employment from the University, and following communication from the Director, Human Resources, appropriate changes shall be effected to deactivate the individual ICT accounts access rights

Privileged Users Access
a) SIMAD University ICT System Administrators shall have the authorization to access more levels of the ICT systems including but not limited to the stored information and other installed software’s and applications in the systems for the purposes of determining the safety and security of the systems. Such system administrators shall be bound and guided by the moral and code of professional ethics in their operations

b) The ICT resource directorate shall review, monitor and regulate user access rights and privileges of System Administrators on a regular basis

c) University ICT System Administrators who violate the provisions of this policy in relation to security or access into the systems shall face disciplinary action which may result to denial of these access rights or as stipulated in the University statutes and other applicable regulations

Contractors, Vendors & Third party ICT resource access
a) All third parties of the University shall obtain ICT access and user authorization from the designated ICT resource owner prior to the utilization and access to these ICT resources and facilities

b) Third party user accounts shall be temporary and shall have expiry dates. Upon completion of the duties for which the third party users were allowed to perform, these accounts shall be deleted or deactivated.

jojobet, ccc, ccc, ccc, http://suuqa.simad.edu.so/, http://sight.simad.edu.so/, http://olearn.simad.edu.so/, http://linguaskill.simad.edu.so/, http://international.simad.edu.so/, http://ict.simad.edu.so/, http://foc.simad.edu.so/, http://fass.simad.edu.so/, http://classof2025.simad.edu.so/, http://ai.simad.edu.so/, https://thesouthwing.org/, sss, a123, 2323, jojobet, jojobet giriş