Technology Policies apply to many levels of work.

Technology Policies

In This Section

Adherence to Belmont University’s information technology policies helps ensure the confidentiality, integrity and availability of the hardware, software, and information required to conduct university business. Please take a few minutes to read the policies that apply to you. If you have any questions about a specific policy, contact the service desk at

Belmont University’s Library and Information Technology Services (LITS) computer resources are intended to support the educational, administrative, and campus life activities of the university. The use of these Computer Resources is a privilege extended to members of the Belmont community, who are expected to act in a responsible, ethical, and legal manner.

In general, acceptable use entails behavior that respects the rights of others, does not compromise the security or integrity of computer and network resources, and complies with all applicable laws and license agreements. This policy establishes specific requirements for the use of computing and network resources at Belmont University. As with other university policies, violation of the Acceptable Use Policy can result in disciplinary action.

This policy applies to all users of computer and network resources owned or managed by Belmont University. Resources include all university owned, licensed, or managed hardware and software, as well as the university network, regardless of the ownership of the device connected to the network, the means of connecting, or the locale from which the connection is made.

The university takes various measures to protect its information resources and users’ accounts. However, you should be aware that the university cannot guarantee privacy and that it is the responsibility of individual users to engage in prudent practices by establishing appropriate access restrictions for their accounts and safeguarding their passwords in accord with the Password Policy.

View the Full Policy

An email account assigned by Belmont University with an email address ending in is considered to be an “Official Belmont University Email Account.” Accordingly, an email sent from a email address shall be considered an “Official Belmont University Email Message.”

The purpose of this policy is to describe the permitted uses of university email. This policy applies to, but is not limited to, university faculty and visiting faculty, adjunct faculty, staff, students, contractors, volunteers, and guests who are provided email services managed by or for Belmont University.

Students and university staff and faculty members will be assigned an official Belmont University email address using Microsoft Office 365.

Email addresses for faculty and staff are assigned upon official employment by the university. Students are assigned a Belmont email address upon matriculation to the university.

View the Full Policy

Passwords are one of the primary mechanisms that protect university information systems and other resources from unauthorized use. Constructing secure passwords and ensuring proper password management are essential. Standards for proper password creation and management greatly reduce these risks. As such, all Belmont University students and employees (including contractors and vendors with access to Belmont University systems) are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords.

The purpose of this policy is to establish a standard for creation of strong passwords, the protection of those passwords, and the frequency of change. The scope of this policy includes all users who have or are responsible for an account (or any form of access that supports or requires a password) on any system that resides at any Belmont University facility, has access to the Belmont University network, or electronically stores any non-public Belmont University information.

Passwords must be protected. Under no circumstances should a user divulge their password to another person. If a password or account is shared with a member of Belmont LITS support for the purposes of resolving a technical issue, then that password must be changed as soon as possible after the incident.

View the Full Policy

Belmont University computing and telecommunication networks, computing equipment and computing resources are owned by the university and are provided to support the academic and administrative functions of the university. Federal and state law, and university policies and procedures govern the use of this equipment and technologies. Any additional university wireless communications requirements must be in compliance with applicable federal and state laws, and this policy. Library Information Technology Services (LITS) defines the standards for the use of networks, including the wireless communications spectrum on campus.

This policy applies to all faculty, staff, students, and others who use the wireless communications spectrum. Wireless applications are broad base and include user supplied wireless access points, smart televisions, printers and other electronic wireless devices on campus. Adherence to the policy will help protect the integrity of the campus wireless network and mitigate security risks. Only authorized access points will be permitted, and all unauthorized access points will be removed.

View the Full Policy

To ensure a remote connections to the Belmont campus network are secure, LITS requires users to utilize a Belmont Virtual Private Network (VPN) to connect to university resources. A VPN is a secured private network that provides a secure encrypted connection or tunnel over the Internet between an individual computer/device and a private network such as the Belmont University Campus Network. The use of a VPN allows members of the Belmont community to securely access campus network resources from off campus as if they were on campus. 

Belmont employees and authorized third parties using the VPN must ensure that unauthorized users are not allowed access to internal university networks and associated information or data. All individuals and machines connecting remotely to university networks are subject to the university's Acceptable Use Policy.

All individuals connecting remotely shall only connect to or have access to machines and resources for which they have received permission and rights to use by the appropriate authorized university representative. All devices connecting remotely should be current on anti-virus software, operating system patches, and all application updates. Firewalls should be enabled at all times.

View the Full Policy

Library and Information Technology Services (LITS) is charged with supporting university owned computer hardware, software and peripherals in ways that meet university strategic priorities.  Belmont University is a highly interconnected instructional entity, and is dependent upon secure and reliable technology to meet these priorities. LITS is responsible for maintaining the university network, servers, workstations, and peripherals, maintaining quality at reasonable costs.  This policy establishes standards, guidelines, and procedures for the purchase of these technologies in ways that support fiscally responsible stewardship of university resources. 

View the Full Policy

Belmont University administrative data are an asset owned by the university and must be protected accordingly. A data classification policy is necessary to provide a framework for securing data from risks including, but not limited to, unauthorized destruction, modification, disclosure, access, use, and removal.  This policy outlines measures and responsibilities required for securing data resources.  It shall be carried out in conformity with state and federal laws.

View the Full Policy

In This Section