Ross IT Policies
Equipment Policies:
Equipment Returns
Ross IT manages IT equipment for faculty & staff. This includes the issuing as well as the returning of equipment. The requirements, process, and specifics related to returning equipment are outlined per this policy.
Ross IT Equipment Swaps
Ross IT collaborates with our customers on IT equipment swaps in various situations. The Ross IT Equipment Swaps policy offers guidance and details the process to be followed in these instances.
Decommissioning a Device
Ross IT collaborates with our customers on the decommissioning of a device. The policy on Decommissioning a Device offers guidance and details the process that is followed with a device that either goes to Property Disposition or a faculty or staff member wants to purchase it.
Personal Printers
Ross IT provides IT equipment to faculty & staff for business purposes. The requirements, steps, and specifics related to a personal printer and the requesting of it are outlined within this policy.
Personal Device Use and Accessing University Systems
Ross IT collaborates with the university and the Ross community to offer guidance and recommendations for using personal devices to access university systems. This policy details the definition of a personal device, methods for securing personal and sensitive data, and additional security guidelines.
Retired or Faculty That Leave IT Equipment Request & Support
Ross IT partners with faculty who are retiring from or leaving the university to provide guidance, requirements, process, and specifics related to any assigned IT equipment and a request to keep the equipment. This policy outlines the various particulars associated with this policy.
Purchasing IT Devices and Seeking Reimbursement
Ross IT aligns with the UM procurement policies related to IT equipment purchases and a reimbursement request. This policy provides information, the policy and process that will be followed regarding the purchase of an IT device that involves non-university funds and the purchaser is seeking a potential reimbursement.
Ross Faculty & Staff Equipment Requests
Ross IT provides IT equipment to faculty & staff for business purposes. The requirements, process, and specifics related to providing this equipment, whether for a new employee or someone seeking additional equipment are outlined per this policy.
Emeritus Equipment & IT Support Policy
Ross IT provides IT equipment and support to Emeritus Faculty for business purposes. The requirements, process, and specifics related to IT equipment and support are outlined per this policy
Student Loaner Laptops
Students may borrow laptops from Ross IT to use in specific classes. This policy defines and outlines the particulars associated with loaning laptops to students.
Standard Security Configuration for Ross Workstations & Laptops
Ross IT workstations and laptops must adhere to security configurations that comply with university standards, including essential settings related to disk encryption, data backup, antivirus, and anti-malware protection, and mechanisms for delivering important security patches to devices. This policy details the foundational software and configuration requirements for workstations and laptops that are university assets and are supported by Ross IT.
Software Policies:
Ross Software Purchases & Use
The IT team at Ross collaborates with faculty and staff regarding the purchase and use of software. The assistance encompasses the procedure for evaluating software to ensure it complies with the university’s standards, as specified within the policy documentation.
Microsoft Office Client Policy
The IT team at Ross works with departments requesting Microsoft Office installation on a device for sponsored affiliates or temporary staff. This policy outlines the conditions for such requests and the procedures to follow to get the Office client.
Support Policies:
AV Support for Events
Ross IT provides support for AV technology that is used within a room that is part of the Ross School of Business. This support pertains to the AV technology and IT equipment that is within the room and used as part of the event. This policy defines and outlines the particulars associated with provided support.
Ross Mediasite Faculty Support Administration
Ross IT supports the Mediasite lecture capture system for faculty and staff to record in the classroom. At the request of instructors, faculty can add the Mediasite Faculty Support group to assist with managing faculty recordings. This policy outlines that process.
Mediasite Access Request
Ross IT provides access to Mediasite for faculty and staff who need it. Faculty and staff can request Mediasite access for teaching assistants and non-Ross instructors. We’ve outlined the requirements, steps, and specifics related to requesting Mediasite access within this policy.
If you would like to request Mediasite access for another person, please fill out this form.
Mediasite Content Management Policy
Ross IT manages a video lecture capture system called Mediasite which provides the ability to create video content related to classes and events. This policy describes the process that is followed by Ross IT support staff regarding the Mediasite content pertaining to content retention, storage time, storage locations, etc.
Personal Device Support
Ross IT offers IT support to the Ross community. Personal devices used within the community, when support is needed, follow a specific support pathway. This policy outlines the support model for such personal devices.
Ross IT Site/Website Hosting
This policy provides information and guidance to the Ross community regarding the options and resources available for site/website hosting. Ross IT does not provide the hosting service, but campus offers hosting options that can be utilized to host a site or website.
Security/Privacy Policies:
Computer, Mobile Device, and Data Encryption
Ross IT requires that all individuals accessing any University information resources abide by defined security policies established for desktops, laptops, and other forms of mobile devices, such as cell phones, portable media, tablets, and other devices. With the increasing use of personal computers and portable devices at the University, strong security practices should be followed involving both private and confidential data. Click here to learn more about the security practices that should be followed.
Device Security Notifications
Ross IT, in alignment with the university Information Security SPG (601.27), requires that all university-owned devices must be kept secure and free from malware and security vulnerabilities. This policy details the procedures for addressing a university asset that has been flagged for security issues and the steps needed to eliminate the threat and restore the device to its original state.
Ross Artificial Intelligence (AI) Guidelines and Recommendations
Ross IT provides recommendations and guidelines when using Artificial Intelligence (AI) within the Ross Community. These recommendations and guidelines are aligned with the university guidelines and provide information related to AI, university-supported AI tools, and the practices that should be followed when using them.
Ross Privacy Policy
The University of Michigan’s Ross School of Business respects the privacy of its community members regarding the responsible use of technological resources. Students, faculty, staff, alumni, and any other party that access Ross sites are subject to these guidelines.
Standard Security Configuration for Ross Workstations & Laptops
Ross IT workstations and laptops must adhere to security configurations that comply with university standards, including essential settings related to disk encryption, data backup, antivirus, and anti-malware protection, and mechanisms for delivering important security patches to devices. This policy details the foundational software and configuration requirements for workstations and laptops that are university assets and are supported by Ross IT.
Folders and Digital Content:
Policy for Ross Shared Folder Naming Conventions
The university offers several platforms that departments can use to create shared folders. When setting up these shared folders for departmental or group use, it’s important to follow a consistent folder structure and incorporate best practices. This policy is here to offer helpful guidance on how to organize your shared folders effectively and ensure everyone is naming shared folders in a consistent manner within a department.
Access Policies:
Personal Device Use and Accessing University Systems
Ross IT collaborates with the university and the Ross community to offer guidance and recommendations for using personal devices to access university systems. This policy details the definition of a personal device, methods for securing personal and sensitive data, and additional security guidelines.
Acceptable Home Use of University Device
Ross IT collaborates with the university and the Ross community to offer guidance and recommendations for using a university device at home. This policy provides guidance and practices for using a university device at home and accessing university systems and data.
Remote Data Access
Remote Data Access entails securely and responsibly managing data within U-M systems. To access this data remotely, specific guidelines and processes must be adhered to. Ross IT’s policy on remote data access outlines the procedures and guidelines that comply with campus security policies.
Accessibility Policies:
Digital Accessibility Policies at the University of Michigan
Digital accessibility involves designing, creating, and maintaining media, websites, applications, and documents so they can be used by the broadest possible audience of people with disabilities, including those individuals who use assistive technology. Ross IT supports the entire Ross Community in their efforts to apply accessibility standards across all U-M created digital content.
Network Policies:
Network Configuration of Non-Standard Workstations
Ross IT manages workstations that are requested by Ross faculty, however because of differences in their configuration and use they are defined as non-standard. This difference results in different network factors which need to be considered and followed as it relates to putting this type of machine on the network. This policy defines and outlines the particulars associated with setting this type of machine up on the network.
Last Updated on August 21, 2025