Skip to main content
Eastern Illinois University

Panthertech

ITS Identification Policy

Policy Statement

Access to University information and/or information resources must be done using identifier and authenticators that are unique to each individual and/or group. User identifiers may only be granted to individuals formally associated with the University and access granted to such identifiers may only be granted if requested by an authorized individual. All access granted through the use of identifier and authenticators must be revoked immediately upon separation from the University and/or the revocation of individual’s need to access such information..

Entities Affected By This Policy

All individuals at the University

Contacts

EIU Information Security 217-581-1939

Principle

User Identification and Authentication

Device Identification and Authentication

Identifier Management

Eastern Illinois University ITS utilizes the Role-based access control (RBAC) model to assign permissions to end-users based on their role within the university. Roles and access to systems and data are based on the department and aligns with the principle of least privilege and need to know.

For example:

IT Onboarding

IT onboarding is the process of setting up new employees in EIU systems. This includes creating new user accounts or emails, acquiring necessary equipment, setting up new workstations, adding new licenses for software, setting up new phone numbers and voicemails, and training employees on IT security.

Related Documents

Federal Educational Rights and Privacy Act

Supporting Policies, Procedures and Guidelines

University Network Identity Life-Cycle Policy

Banner Access Request Forms (Available from Banner Security Specialist)

Last Date Reviewed: 06/13/2024

CONTACT THE DEPARTMENT

Technology Support

217-581-4357
support@eiu.edu