Security Protocol for Computing Devices in Facilities Management
| Procedure Number: E01 |
| Issue Date: November 11, 2011 |
| Last Revision Date: October 13, 2025 |
Security Protocol for Computing Devices in Facilities Management
Description:
Facilities Management (FM) users will act in accordance with University policies to ensure appropriate measures are in place for the security of all computing devices, such as laptops, desktops, and tablets.
All FM employees are required to review, be familiar with, and follow Weber State University's IT related policies contained in the following:
PPM 10-1 Information Security Policy
PPM 10-2 Acceptable Use Policy
PPM 10-3 Network Security/Firewall Policy
PPM 10-4 Payment Card Handling Policy
PPM 10-5 University Telecommunications Services
PPM 10-6 Mobile Device Policy
The Business Applications Manager or designee will ensure that proper security measures are set up initially for all computing devices received in FM.
All software must be pre-approved through a software risk assessment. Software risk assessments are used to evaluate all software requests and software applications, and include a security and/or legal review. If any needed software or mobile app has not previously received software risk assessment approval by the Information Security Office, the employee or shop must contact the FM Campus Technology Coordinator, or designee, to initiate the assessment. Software risk assessment approval is required prior to installation of any software or app on University-owned computing devices.
All computing devices no longer being actively used by the assigned FM end-user will be taken to the FM Campus Technology Coordinator to have their storage devices securely wiped of data and be properly updated in the University asset inventory.
