Applicable To: 

Duke University

IT Security Office position statement:

In accordance with the Duke Acceptable Use Policy and the Duke Confidentiality Agreement, the IT Security Office recommends that Duke staff follow appropriate protocols when providing IT support for any Duke-owned computer used by a faculty/staff member or student. This includes:

  • Provide notification and obtain prior approval for any access (in person or remote) of a Duke-owned computer used by a faculty/staff member or student. Document any activity conducted during access of the device.
  • Follow appropriate processes to prevent inadvertent loss or modification of data on the device. Any backups made of the device (such as before repair) should be deleted immediately upon return of the machine to the user.
  • Contact the departmental IT manager immediately If there is any concern about a potential violation of Duke policy. The IT manager then should contact ITSO (Security@Duke) for guidance before any action is taken. 

IT Security Office position statements outline the ITSO's view on security-related topics and provide guidance concerning university standards.


Document Type: Other