Computing systems, whether traditional desktop machines, or hand-held devices, form the backbone of University administrative, teaching, and research activity.  These assets represent a substantial financial investment, contain critical and sensitive business, academic, and research information, and are essential to University operations. The loss of these assets would present the campus with serious consequences ranging from disruption of service to significant financial, administrative, and legal sanctions.

Therefore it is incumbent on the University to actively manage these assets to:

  1. Secure them against loss, damage, or theft, and
  2. Assure their appropriate and reliable use.

To accomplish those objectives:





1 “Actively managed” refers to the practice of configuring and monitoring the device to safeguard the device itself, as well as any stored data, and the device’s role in the relevant business, academic, or research process.

2 Please, see the accompanying Procedures for Managing and Securing University-owned Endpoint Computing Assets(currently under development).