Skip to main content

6.23 NETWORK LOGON BANNER

Effective: August 15, 2024

Purpose: Emporia State University is committed to maintaining the confidentiality, integrity, and accessibility of the information assets it owns or controls.

The purpose of this policy is to ensure that University devices contain a network login banner that is the electronic version of a “No Trespassing” sign.

Scope: This policy applies to all computers owned or controlled by the University including but not limited to servers, workstations and infrastructure devices.

For those devices that allow multiple avenues for logging in, this banner must be present at each avenue.

Responsible Office: Information Technology

Policy Statement: The University will develop a standard banner to be used for all systems reflecting the Acceptable Use Policy.

Information Technology (IT) is responsible for applying the banner on systems it manages. Unit Support Personnel are responsible for applying the banner on systems they manage. All devices shared between multiple areas within the University are considered to be owned by the Chief Information Officer (CIO), and IT is responsible for applying the banner.

The Information Security Officer (ISO) is responsible for monitoring and reporting compliance with this policy and for reviewing this policy on an annual basis.

Every login process for ESU systems, multi-user computers, and infrastructure devices must include a standard University banner identifying system ownership, system usage restrictions, prohibition of unauthorized access, implied consent and associated penalties for unauthorized access. The user must acknowledge the system use notification before gaining access to the information system.

The President or designee must approve any exceptions to this policy.

Definitions: All words and phrases shall be interpreted utilizing their plain meanings unless otherwise defined in another University or Board of Regents policy or by statute or regulation.

Procedures: All procedures linked and related to the policies above shall have the full force and effect of policy if said procedures have first been properly approved by the University’s administrator in charge of Information Technology.

[Information Technology procedures - coming soon]

Related Policy Information: [coming soon]

History and Revisions

Adoption Date:
10/20/2006 [FSB 06012 passed by Faculty Senate on 10/03/2006, approved by President, and included in UPM as Policy 3J.23]
Revision Date:
10/02/2013 [Policy updated]
11/12/2019 [Policy updated by IS]
02/18/2020 [Policy removed from Faculty Senate]
02/19/2020 [Policy approved by ISAC]
08/15/2024 [Policy format revised as part of UPM Revision]