Page 53 - Post Handbook Update 7-18-23
P. 53

  CHAPTER 8: EMPLOYMENT PRACTICES AND WORKPLACE EXPECTATIONS
 Copyright Protection: Post University’s courses contain copyrighted materials created by the University or licensed from various third parties. In compliance with applicable law, these resource materials may not be reproduced, revised, or distributed without the written permission of Post’s Regulatory Compliance Department. Individuals who violate this policy may be subject to disciplinary action up to and including termination of employment, and individuals who violate applicable copyright law may be subject to other applicable legal liabilities.
Scholarly Works: Other than the intellectual property described above which is owned by Post University, intellectual property rights in scholarly works, belong to the faculty member or student who created the work, absent a written agreement otherwise; however, such scholarly works may never be used or distributed in violation of Post’s policies including without limitation Post’s policies related to academic integrity. For example, student works turned in for credit may not be used in any manner where it is intended to aid another student in fulfilling their course requirements in an academically dishonest manner.
Intellectual Property Protection: Post University requires all contracted Course Developers to sign an Intellectual Property Agreement. All developed course materials (electronic or hard copy) are the sole property of Post University and must be returned to Post upon separation of employment. The ongoing expectations of this policy apply to both current and former associates.
INFORMATION SECURITY-CLEAN DESK/SCREEN/WHITEBOARD
Ensuring that information security safeguards are being strictly followed provides reassurance and peace of mind to students, student family members, staff and all doing business with Post. The policy guidelines referenced herein should be consistently followed and apply to staff working on-site, remotely or during Post-related travel.
What is sensitive data? Sensitive data can include personal information such as birth dates, social security numbers, contact information; financial information such as bank accounts, credit card numbers, and loan information; academic information such as grades, disciplinary actions, and academic progress reports; associate information such as salary, disciplinary actions, and health status; and University information such as financial statements, proprietary procedures, and managerial statistics.
Applicable Laws
The Family Educational Rights and Privacy Act (FERPA) is a federal law that protects students’ sensitive
data, including educational information, personally identifiable information, and directory information.
The Gramm-Leach-Bliley Act (GLBA) is a federal law that protects consumer financial data. At the university level it applies to the collection, use, and storage of financial records.
Data Classified as Restricted, Confidential, or Internal
Sensitive data pertaining to students and staff which is collected, used, and maintained by Post personnel must be kept secure. Storage devices, workstations, laptops, and servers must be secured when not in use. University sites open to public traffic must be kept clear of sensitive data. This includes desktops, whiteboards, and device monitors. Desktops, whiteboards, and device monitors
in staff-only areas must be cleared or secured when not in use. Internal data related to the operations of Post University must also be secured with these methods.
All data classified as restricted, confidential, or internal in printed format or stored on digital media such as
USB sticks, portable hard drives, DVDs, or CDs should be kept secure when not in use. This data should not be left on desks when unattended and desk drawers, file cabinets, and file storage closets should be kept locked. Additionally, associates should limit leaving sensitive documents in plain view where they could easily be read by others passing through a shared work area. At the end of the workday the following types of information should not be left on the associate’s desk.
• Documents or notes containing student or associate personally identifiable information such as name, social security numbers, or date of birth.
• Documents or notes containing credit card information including account numbers, expiration dates, or CVV numbers.
• Documents containing student educational records.
• Documents containing student or associate medical records.
• Post-it notes with student/associate names, addresses, phone numbers, etc.
• Notebooks with written notes pertaining to a student/ associate.
• Folders that contain student/associate information.
• Printed reports containing student/associate information.
   POST UNIVERSITY ASSOCIATE ROADMAP HANDBOOK
52









































































   51   52   53   54   55