IT-Related Policies and Documents
Siena Heights Division of Information Technology enforces various policies relating to how communications, security, and privacy are handled while using University technology. As a member of Siena Heights University, you agree to adhere to these policies while using university assets and technology. These policies are provided below for reference. If you have any questions or would like more information regarding the contents of a policy, please contact the referenced individual(s) listed at the end of each policy.
Website Privacy and Security Policy
Siena Heights University is committed to ensuring the privacy and accuracy of your confidential
information. We do not actively share personal information gathered from our Web servers.
However, some information collected from our Web site, including the summary server log
information, e-mails sent to the Web site, and information collected from Web-based forms, may
be subject to the review to meet Federal and State reporting requirements. This means that while
we do not actively share information, in some cases we may be compelled by law to release
information gathered from our Web servers. To read more, view the PDF document below.
Electronic Communications Policy
Electronic Communications (e-communications) including the Internet, e-mail,
Newsgroups, social networking sites and computer facilities of Siena Heights
University combine to form an online extension of Siena Heights. As such, the
purpose of e-communication is to support and promote the university as an
institution that assists people to become more competent, purposeful, and
ethical through a teaching and learning environment which respects the dignity
of all. To read more, view the PDF below.
Response to Compromised Account Policy
This policy applies to students, staff, faculty, and other members of the Siena Heights University
community with an active account. The policy describes steps IT Services will take to ensure the security
of accounts and education of community members when they are compromised. To read more, view the PDF below.