The Acceptable Use of Information Technology Resources Policy provides guidelines for the appropriate use of information technology resources at Wellesley College and establish sanctions for violations of this policy.
This policy was established to ensure the preservation and availability of the official records of Wellesley College for administrative, fiscal, legal, and historical purposes and outlines the management of College records and the collection and preservation of papers, records and documents by the Wellesley College Archives.
This policy outlines the multiple central file storage options available for Wellesley College faculty and staff in order to address the growing need for greater file storage.
This policy outlines a set of principles and practices to guide in decision making regarding collection development for the Wellesley College Library. These principles undergo continual assessment and adjustment to ensure that the collection responds to changes in the curriculum and in the forms and formats of scholarly information needed to support the needs of the community.
The Wellesley College Copyright Policy establishes guidelines regarding the Fair Use of copyrighted material, use of multimedia and copyrighted works in the classroom, and information regarding the Digital Millennium Copyright Act.
The Wellesley College Digital Scholarship and Archive (DSA) Policy establishes guidelines for the use of the DSA, including submission of materials, access, and compliance with copyright standards.
The Wellesley College Stewardship of Electronic Content Policy establishes the exceptions to electronic content privacy at Wellesley College, including the retention of and access to electronic content following the departure of an employee. For a detailed overview of account terminations, see the account terminations table.
As a Congressionally-designated Federal Depository Library for the 4th Congressional District of Massachusetts, the Wellesley College Library makes Government publications available for the free use of the general public, regardless of age. The Federal Depository Documents Access Policy documents the Library's adherence to the access policies outlined in the Federal Depository Library Handbook , developed by the U.S. Government Printing Office (GPO).
The Hardware Replacement Policy establishes guidelines for the replacement of all College-owned hardware, outlines Library and Technology Services recommendations for standard configurations, and establishes responsibilities for departments wishing to exceed those configurations.
This policy establishes who can access and have borrowing privileges for the Wellesley College Libraries, and outlines the use related to those privileges.
The purpose of this policy is to outline for potential donors the guidelines and processes for making gifts of tangible property to the library including the criteria for evaluation, acceptance and disposition of gifts by the Library, Archives and Special Collections.
The purpose of this document is to establish a records management policy for Wellesley College, define key concepts specific to the Wellesley College policy and describe a framework for implementing this policy through a records management program.
The Remote Access Policy defines standards for connecting to the Wellesley College network from any host. These standards are designed to minimize the potential threat to Wellesley College information technology resources and thereby protect sensitive college data.
The Approval for Sakai Sites policy is intended to ensure that any Sakai site created within the Wellesley College domain is to be used for purposes consistent with the mission of the College. This policy provides guidelines for obtaining approval for the creation of a Sakai site and establishes sanctions for violation of these guidelines.
Outlines policy for reproduction or publishing of images or text from Special Collections materials.
This statement outlines the necessary conditions that must be met in order to make an electronic signature legally viable.
Establishes employee responsibilities in protecting data containing personal information and outlines specific administrative, technical and physical safeguards.