Country |
Kingdom of Saudi Arabia |
Ministry |
Education |
System |
All relevant systems referred to in the introduction. |
Regulation |
All relevant regulations referred to in the introduction. |
University |
Umm Al-Qura |
Academic Year |
One-year duration according to the official university calendar. |
IT Director |
Director of IT Department |
Dean |
Dean of IT |
Members of the Academic Staff |
Professors, Associate Professors, Assistant Professors, and similar persons. |
Human Resources |
Human Resources Department at the University (the Deanship Academic Staff and Employees Affairs) |
Guide |
The Policies and Procedures Guide is a practical manual to implement the operations in a deanship or department It includes the policies, procedures, and signature authority table. |
Network |
University Electronic Network |
Policy |
Specific work method to guide and set immediate and future decisions. The policy guides decision-making according to a specific set of conditions and within a framework of institutional objectives and administrative principles. |
Procedures |
A specific method used to achieve something or a regular way to perform things, as procedures are a set of steps to be followed to adhere to the work system. |
The Deanship of Information Technology |
The Deanship of Information Technology at the University |
The University Community |
All the staff and students of Umm Al-Qura University |
President |
President of the University |
Network Equipment |
Any physical device, including parts linking the basic communication infrastructure with the network, e.g., the following devices: router, switch, hub, bridge, and gateway. |
Troubleshoot |
Troubleshooting problems in the operation system or software; troubleshooting includes updating the programs. |
Operation System |
Operation Systems, e.g., (Windows, Mac, Linux, and Unix.) |
Update |
A new version of the program provided with bug fixes and performance improvements. |
Resource |
The company, or public or private establishments that participate in the university tenders or price agreements, or those which supply goods and services or perform university work. |
Users |
The name given to the person or party authorized to use the university networks or computer resources. This includes the students, employees, academic staff, graduates, and parties that have links with the university that enable them to use the university's resources. Some users may be given additional authorization to access the institutional data under the delegation of the data owner or keeper. |
Data Keeper |
Data keepers are the university representatives responsible for supervising the university data in a special field. The data keepers are responsible for developing the procedures necessary to save and use this data according to published policies and procedures. |
IT Resources |
These resources include the facilities and information technology used to process, circulate, and store university data. |
Security Incidents |
This includes any accident, whether intentional or unintentional, that affects information or relevant technology, and which impacts leakage, safety, or the ability to access the required data. |
Security Procedures |
These include the transactions, software, and devices used by the system and network administrators to ensure the confidentiality and safety of the university information technology resources. The security procedures may also include reviewing the data to discover any violations and investigating the issues related to information security. |