6.23 NETWORK LOGON BANNER
Effective: August 15, 2024
Purpose: Emporia State University is committed to maintaining the confidentiality, integrity, and accessibility of the information assets it owns or controls.
The purpose of this policy is to ensure that University devices contain a network login banner that is the electronic version of a “No Trespassing” sign.
Scope: This policy applies to all computers owned or controlled by the University including but not limited to servers, workstations and infrastructure devices.
For those devices that allow multiple avenues for logging in, this banner must be present at each avenue.
Responsible Office: Information Technology
Policy Statement: The University will develop a standard banner to be used for all systems reflecting the Acceptable Use Policy.
Information Technology (IT) is responsible for applying the banner on systems it manages. Unit Support Personnel are responsible for applying the banner on systems they manage. All devices shared between multiple areas within the University are considered to be owned by the Chief Information Officer (CIO), and IT is responsible for applying the banner.
The Information Security Officer (ISO) is responsible for monitoring and reporting compliance with this policy and for reviewing this policy on an annual basis.
Every login process for ESU systems, multi-user computers, and infrastructure devices must include a standard University banner identifying system ownership, system usage restrictions, prohibition of unauthorized access, implied consent and associated penalties for unauthorized access. The user must acknowledge the system use notification before gaining access to the information system.
The President or designee must approve any exceptions to this policy.
Definitions: All words and phrases shall be interpreted utilizing their plain meanings unless otherwise defined in another University or Board of Regents policy or by statute or regulation.
Procedures: All procedures linked and related to the policies above shall have the full force and effect of policy if said procedures have first been properly approved by the University’s administrator in charge of Information Technology.
[Information Technology procedures - coming soon]
Related Policy Information: [coming soon]