BYU-Idaho's Information Technology strives to implement standards of industry best-practice through the use of approved policies and procedures.  The following policies and procedures are currently upheld by our administration and staff.

Computer Security and Use Policy

Brigham Young University-Idaho owns, operates, and maintains computers and private networks for the purpose of meeting the objectives of its mission statement. Computer and network access for patrons, hereafter called users, is restricted to authorized faculty, staff, students, and others who have been approved by appropriate administrators. The networks and computing resources at BYU-Idaho provide students and employees with many capabilities. With these benefits come responsibilities and obligations required of those who use University provided resources. Users must use those resources in an ethical and legal manner, consistent with University policy, the BYU-Idaho Honor Code and applicable laws of the land.

Data Center Access Policy

The BYU-Idaho Data Center provides specific environmental conditions and a number of other elements required by the mission-critical services necessary for university operations. Access is controlled to protect the physical resources and the enterprise data from unauthorized use, accidental or malicious damage and theft.

Data Encryption & Shredding Guidelines

The Computer and Data Security (8-4) policy discourages employees from placing confidential information on local drives or mobile devices and, when necessary, requires such data to be encrypted. It further recommends such data be securely erased or shredded when no longer needed. These guidelines help those who need to put confidential information on their PC local drive, network drive, USB drive, etc.

IT Change Management

The goal of IT change management at BYU-Idaho is to provide a consistent framework for making changes to critical systems to increase overall system reliability and security without heavily impacting the performance of day-to-day operations. This procedure is designed primarily to address operational changes. Changes related to IT projects will often require additional planning and extended coordination with others as part of the project planning process.

IT Maintenance Policy and Procedure

This policy provides a process for IT system maintenance, upgrades, and replacements, to ensure IT service reliability.  It applies when the IT Change Management Policy dictates a maintenance window is necessary.

Social Media Policy

Social media has been approved as a university communication channel.  The Official Policy may be viewed at the following link:

Software Acquisition Policy

Brigham Young University-Idaho invests heavily in creating an effective computing environment for its patrons. In order to best manage this substantial investment and ensure newly purchased and donated pieces fit seamlessly and securely into the university-owned computers and network, software products are to be reviewed thoroughly before a purchase order or contract can be issued. Such practices will ensure that software purchases and donations will adhere to university standards, be compatible with existing enterprise systems, and are able to be supported on the university network.  The primary goal of this policy is to properly oversee the installation and configuration of software pieces on campus computer systems.