Skip to main content

Cybersecurity Resources

VMI Resources About Computer Use, Security Policy, and IT Rules

Acceptable Use of VMI Information Systems (General Order 50)

This policy defines how computers, networks, and information systems can be used at VMI.

Key points covered:

  • Acceptable use of VMI networks and computing systems
  • Security requirements for software and cloud systems
  • User responsibilities for protecting institutional data
  • Compliance with vendor software agreements

Example rule: Software handling VMI data in the cloud must undergo IT security review.

Website / Internet Privacy Policy

This page explains how VMI collects and manages information from users of its website.

Topics include:

  • Use of cookies on VMI systems (email, library server, Citrix)
  • Data collection practices
  • Privacy protections for users interacting with VMI systems

Example: certain applications may place cookies on a user’s computer to enable system interaction.

Restricted Web Content Policy (IT Office)

This page explains categories of websites that may be restricted or monitored on the VMI network.

Examples of restricted activities:

  • Unauthorized hacking or network compromise
  • Distribution of tools that break licensing or security systems
  • Certain illegal or harmful online content

These restrictions help maintain network security and compliance with laws.

Cellular Device Issuance & Usage Policy (General Order 26)

This policy governs VMI-issued smartphones and mobile devices.

Important rules include:

  • Devices must follow VMI password policies
  • Jailbreaking or altering the device configuration is prohibited
  • Communications on VMI devices may have no expectation of privacy

These rules ensure that institutional devices follow security standards.

Privacy and Records Policy (General Order 54)

This policy addresses privacy, data protection, and information security responsibilities.

Topics include:

  • Compliance with federal and state laws on information security
  • Protection against misuse or alteration of institutional data
  • Handling of personal and institutional information

VMI states that it has security measures to protect institutional information from misuse or alteration.

Telework Policy (Security Requirements for Remote Work - General Order 59)

This policy includes cybersecurity requirements for employees working remotely.

Requirements include:

  • Remote computers must follow VMI security guidelines
  • Systems must use virus protection and password policies
  • Confidential documents must be protected from unauthorized access

Remote work devices must comply with security, licensing, and password standards.

 

Other Related Institutional References

Computer Security Training Requirement

Example reference - Classified Employee Handbook

Employees must complete computer security awareness training to protect VMI systems from malware and cyber threats.