{"id":153,"date":"2017-04-25T17:25:53","date_gmt":"2017-04-25T17:25:53","guid":{"rendered":"https:\/\/www.macalester.edu\/its\/application-system-access\/"},"modified":"2026-02-24T10:38:58","modified_gmt":"2026-02-24T16:38:58","slug":"application-system-access","status":"publish","type":"page","link":"https:\/\/www.macalester.edu\/its\/policies\/application-system-access\/","title":{"rendered":"Application and System Access Policy"},"content":{"rendered":"<h2 class=\"wp-block-heading\">Policy<\/h2>\n\n\n\n<p>Macalester College is committed to promoting secure and appropriate access to its systems,&nbsp;and to the data used, processed, stored, maintained and\/or transmitted in and through&nbsp;those systems. This policy defines expectations of users who have been granted access to College enterprise systems.*<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Purpose<\/h2>\n\n\n\n<p>College-owned applications and systems, including the data stored therein, have a significant value and are an integral part of the infrastructure that supports Macalester\u2019s mission, goals and critical operations. It is essential that access to and use of these applications, systems, and data are properly secured and protected against information security related threats and dangers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Procedures<\/h2>\n\n\n\n<p>Access to college-owned applications and systems assumes user observance of the <a href=\"https:\/\/www.macalester.edu\/its\/about\/policies\/responsible-use\/\">Information Technology Responsible Use Policy<\/a> and <a href=\"https:\/\/www.macalester.edu\/its\/policies\/\">related policies<\/a>. &nbsp;Access may be revoked if any of these policies are violated.  Other actions, up to and including termination of employment, may also be taken, depending on the particular violation. All access to, and activity within systems and applications is monitored and logged. All users are required to adhere to the following rules in order to use, access, store, process, and\/or display data acquired from college-owned applications and systems:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Access to college-owned applications and systems is granted solely to conduct legitimate business on behalf of Macalester College.<\/li>\n\n\n\n<li>Access to specific system functions and data populations is consistent with each user\u2019s scope of employment.<\/li>\n\n\n\n<li>Access requests are initiated by electronic authenticated request from department or unit managers who have knowledge regarding a user\u2019s legitimate need to access\/change data that is financial, managerial, confidential, regulated, or mission critical. Access requests for academic department users must be approved by personnel responsible for the data related to the request.<\/li>\n\n\n\n<li>User accounts will remain active until a user\u2019s employment relationship either changes or terminates.<\/li>\n\n\n\n<li>Data access changes are initiated\/approved by the Data Steward(s) responsible for managing access to the respective data.<\/li>\n\n\n\n<li>Non-Macalester persons who require access to enterprise systems* must receive documented approval for this access by an appropriate Macalester official and be reviewed by the Information Security Officer.<\/li>\n<\/ol>\n\n\n\n<p>* An enterprise system is any computing system maintained by Information Technology Services that is used by more than one department or unit and that contains financial, managerial, confidential, regulated, or mission critical information.<\/p>\n\n\n\n<p>Version: 1.0<br>Published: September 27, 2016<br>Last Review: February 24, 2026<\/p>","protected":false},"excerpt":{"rendered":"<p>Policy Macalester College is committed to promoting secure and appropriate access to its systems,&nbsp;and to the data used, processed, stored, maintained and\/or transmitted in and through&nbsp;those systems. This policy defines expectations of users who have been granted access to College enterprise systems.* Purpose College-owned applications and systems, including the data stored therein, have a significant [&hellip;]<\/p>","protected":false},"author":17,"featured_media":0,"parent":149,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-153","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.macalester.edu\/its\/wp-json\/wp\/v2\/pages\/153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.macalester.edu\/its\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.macalester.edu\/its\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.macalester.edu\/its\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.macalester.edu\/its\/wp-json\/wp\/v2\/comments?post=153"}],"version-history":[{"count":7,"href":"https:\/\/www.macalester.edu\/its\/wp-json\/wp\/v2\/pages\/153\/revisions"}],"predecessor-version":[{"id":8871,"href":"https:\/\/www.macalester.edu\/its\/wp-json\/wp\/v2\/pages\/153\/revisions\/8871"}],"up":[{"embeddable":true,"href":"https:\/\/www.macalester.edu\/its\/wp-json\/wp\/v2\/pages\/149"}],"wp:attachment":[{"href":"https:\/\/www.macalester.edu\/its\/wp-json\/wp\/v2\/media?parent=153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}