Home Campus Directory | A-Z Index

Administrative User Rights Policy

Purpose

This document outlines the responsibilities and obligations an end-user assumes if granted administrative privileges on their University-provided computer(s). By default all end-user computers provided by the University at Penn State Wilkes-Barre will be configured to operate in least-privilege mode. In the event the end-user’s work requires administrative privileges, this document outlines the conditions under which that access will be provided.

Scope

This policy applies to all Penn State Wilkes-Barre full-time and part-time faculty, staff and students. Administrative privileges will only be granted when there are extenuating circumstances and will be limited to the amount of time that Information Technology staff believes is necessary to solve the problem.

Definitions

Remediate – correct or make right.

ADG01 - Glossary of Computerized Data and System Terminology

Policy

Completion of the Administrative User Rights Agreement is a requirement to be given administrative rights on a University owned computer.

Guidelines

Usage of Penn State computer systems, software, and network services acknowledges agreement by the user to comply with all applicable University and Penn State Wilkes-Barre policies including, but not limited to AD19 - Use of Penn State Identification Number and Social Security Number, AD20 - Computer and Network Security, AD23 - Use of Institutional Data, AD53 - Privacy Statement, AD57 - General Regulations on Use of University Property, ADG01 - Glossary of Computerized Data and System Terminology, ADG02 - Computer Facility Security Guideline and the white paper Operating in Least Privilege Mode http://sos.its.psu.edu/resources/pdfs/privileges.pdf . These policies may be referenced at http://guru.psu.edu/POLICIES/ and http://www.wb.psu.edu/StudentServices/IT/cs.htm. All Penn State Wilkes-Barre systems are subject to electronic auditing by Penn State Wilkes-Barre Information Technology Services staff.

Specific user responsibilities include:

  1. Read and agree to abide by all applicable University and Penn State Wilkes-Barre policies including, but not limited to AD19 - Use of Penn State Identification Number and Social Security Number, AD20 - Computer and Network Security, AD23 - Use of Institutional Data, AD53 - Privacy Statement, AD57 - General Regulations on Use of University Property, ADG01 - Glossary of Computerized Data and System Terminology, ADG02 - Computer Facility Security Guideline and the white paper Operating in Least Privilege Mode http://sos.its.psu.edu/resources/pdfs/privileges.pdf .
  2. Agree not to share account IDs or passwords or use the account IDs and passwords of another user.
  3. Penn State computer systems, software, and network services are to only be used by authorized Penn State faculty and staff for University business.
  4. Comply with all software license agreements governing installed software. (Please consult campus ITS staff with questions or concerns.)
  5. Agree to not alter system hardware, software, or network configurations to prevent access by Penn State Wilkes-Barre ITS staff or the operation of campus security applications.
  6. Assume sole responsibility and accountability for the system’s operation, any software installed, and its interaction with campus and university networks.
  7. Agree to periodic inspection of the University owned device by the campus ITS staff to ensure compliance with University and campus policies and software copyright laws.
  8. Agree to disconnect from the campus data network should any network or security issues arise concerning this system, including suspected virus activity or any network security bypass, until the issues are resolved.
  9. Agree to run the latest Identity Finder Software, remediate data and successfully pass a PII scan every 15 days.
  10. Backup important user files.
  11. Ensure physical security of the computer at all times. (This is especially significant for laptop computers.)
  12. Agree to operate their University-owned computer in least user privilege mode for routine daily computer operations as a standard practice and only use administrative privilege when prompted as a result of user-initiated actions.
  13. Non-compliance with the above guidelines will result in termination of administrative access.

Administrative User Rights Agreement

Attach documentation outlining the reasons for requesting administrative privileges and obtain your director’s signature. Forward completed form to the Penn State Wilkes-Barre IT Services office at wbitsupport@psu.edu.

This section is to be completed by the requestor.

I have read and agree to abide by the Administrative User Rights Policy PSU-WB-ITS-006.

Name (please print):

Signature:

Date:

Access Account userid:

This section is to be completed by the department director.

I approve this request for administrative user rights.

Director Name (Please print):

Director Signature:

Date:

Department:

This section to be completed by Penn State Wilkes-Barre Information Technology Services.

I approve this request for administrative user rights.

IP Address:

System Model/Serial Number:

System Location:

IT Director Signature/Date:

Date Admin Rights begin:

Date Admin Rights end: