IT governance provides strategic leadership, establishes campus-wide IT priorities and policies.
Academic Continuity Plan
It’s always a good idea to prepare your face-to-face courses for situations that could result in an extended campus closure. Please review the information contained within the Academic Continuity Plan and the Academic Continuity Checklist which provides faculty with a variety of tools that will maintain academic continuity during an extended campus closure.
Policies and Security Awareness Information
Laptop Checkout Agreement
Current Kutztown University faculty, staff and students, with a valid KU ID, are eligible to checkout a laptop. The laptop agreement document below must be filled out and given to Information Technology before receiving the laptop.
- Kutztown University Acceptable Use Policy
- Online Security Awareness Training Program
- Comprehensive Information Security Program
As part of the Middle States program review, the Kutztown University Information Technology department underwent a review by an independent external agency. The review was conducted over the spring and summer of 2017. The final report was delivered in early November with the final presentation taking place on November 15th. The report is available below for viewing.
17-0918 Kutztown Assessment
Kutztown University is a participating organization in the InCommon Federation. InCommon requires participants to make available their operational practices to other participants.
Participation in the InCommon Federation ("Federation") enables a federation participating organization ("Participant") to use Shibboleth identity attribute sharing technologies to manage access to on-line resources that can be made available to the InCommon community. One goal of the Federation is to develop, over time, community standards for such cooperating organizations to ensure that shared attribute assertions are sufficiently robust and trustworthy to manage access to important protected resources. As the community of trust evolves, the Federation expects that participants eventually should be able to trust each other's identity management systems and resource access management systems as they trust their own.