Administrative Access Policy
Responsible Office or Committee: Information Technology (IT)
Effective Date: November 1, 2024
Purpose
University-owned laptops and desktop computers are property of the University of Indianapolis and are provided to further the business processes, teaching, and research by employees of the University. The purpose of this policy is to improve the security, stability, and business continuity of our computer systems by limiting administrative access to authorized personnel only when necessary.
Policy Statement
Administrative Rights Restriction
By default, administrative rights will not be granted to standard users on Windows and Mac laptops and desktops. All users will be assigned standard user accounts with limited privileges.
Authorized Administrative Access
A designated group of IT administrators will be responsible for managing and maintaining administrative tasks on Windows and Mac systems. Access to administrative accounts will be granted only to authorized personnel who require it to fulfill their job responsibilities.
User Support and Assistance
The Information Technology (IT) department will provide technical support and assistance to users with standard user accounts for tasks that require administrative privileges. Standard user accounts will be equipped with necessary applications and tools to perform regular tasks efficiently. Requests for assistance installing software or temporary administrative access should be submitted to the IT Help Desk.
Exceptions
Exceptions to this policy may be granted in rare cases where business requirements or specific job responsibilities necessitate administrative access. Exception requests must be submitted to the IT Help Desk and must be approved by the Chief Technology Officer.
Exceptions may be time limited depending on the identified requirements. Approved exceptions may be reviewed and revoked if circumstances change. Any approved exceptions may require compensating controls such as Multi-Factor Authentication during the computer sign-in process and periodic password changes.
Appropriate Use of Administrative Access
When granted temporary or permanent administrative access:
- Users must adhere to the University’s Network and System Usage Agreement.
- Users should only access and utilize applications, files, and data that are within the scope of their job responsibilities.
- Users must refrain from attempting to modify system configurations, installing malicious software, or altering security settings without authorization.
- Users are prohibited from engaging in any activity that may compromise the confidentiality, integrity, or availability of the computer systems, including the introduction of malware or unauthorized access attempts.
- Users should report any suspected security incidents or potential vulnerabilities to the IT Help Desk promptly.
Periodic Audits
Audits may be conducted to ensure compliance with this policy. Unauthorized administrative accounts will be identified, and appropriate action will be taken.
Violations and Consequences
Any violation of this policy may result in disciplinary actions, including but not limited to, temporary or permanent revocation of system access privileges.