Cybersecurity & IT Policy Updates

The following IT policy documents have been updated. Please familiarize yourself with these documents when you have the opportunity and reach out to us by emailing rt@highlands.edu if you have any questions or concerns.

IT BYOD Policy

Georgia Highlands College (GHC) permits authorized employees to use personally owned computing devices for work. All GHC employees utilizing personally owned devices connected to a GHC network (including Wi-Fi) and/or capable of collecting, storing, or processing GHC data must adhere to GHC policies, standards, and procedures while using those devices for work assignments, projects, or any other official activity. These devices must maintain a reasonable security configuration and be used responsibly in order to protect the confidentiality, integrity, and availability of institution systems, data, and information technology resources owned or operated by GHC.

IT BYOD Standard

This standard sets forth specific security requirements for employee BYOD devices described in the BYOD policy. GHC reserves the right to monitor user activity on BYOD devices to ensure compliance with this standard.

IT Audit Policy

Employees who have been designated as data stewards at Georgia Highlands College (GHC) are required to establish authorization procedures with GHC’s data governance committee (Data Council) and/or Chief Information Officer in order to facilitate appropriate data access and to protect the confidentiality of data in their operational areas. User access to each information system must be reviewed regularly. Data stewards must audit user access to each information system every six months and document findings with the Information Security Officer or a designated IT employee. The Information Security Officer may also initiate an audit of an information system for the following reasons:

  • In order to ensure confidentiality, integrity, and availability of data, information systems, and information technology resources.
  • As part of a cybersecurity incident response or investigation in accordance with the Incident Response Plan.
  • To verify user compliance with IT policies.
  • As part of a continuous monitoring process for critical or high-risk information systems, where appropriate.

IT Learning Management System Policy

This is the primary document for the operation of the Learning Management System (LMS) of Georgia Highlands College. This policy serves as a general framework for the management of the LMS with supporting policies, standards, and guidelines providing additional details for the use and oversight of this information system.