鶹Ƶ

Technology Policies 6.00 - 6.15

6.00 - Information Technology Security

Approved by the Board of Trustees on May 8, 2025, Motion No. 25-05-01
Supersedes Motion No. 06-01-03

鶹Ƶ is a state agency. The college is obligated to provide reasonable security and protection of all Information Technology (IT) usage within its ownership and control.

This policy serves as a foundational document that guides all other YVC procedures, principles, and standards pertaining to Information Technology. Policy 6.00 complies with the Washington State Technology Services Board (TSB).
 
All employees, contractors, vendors, and Tech Services users must comply with campus IT security procedures and standards. Regular user education on IT security best practices will be provided to all stakeholders.

The Board of Trustees hereby directs the college president and administration to develop and implement appropriate procedures and standards to assure the integrity and security of all campus Information Technology facilities, resources, and services that are managed by YVC.

 

Revision Log

Date By Notes
5/8/2025 Motion No. 25-05-01 Updated to reflect current practices.
 1/19/2006 Motion No. 06-01-03  New policy

Policy Contact:  Director of Technology Services


6.01 - Information Technology

Update Approved by Administrative Council on April 22, 2025


Purpose

This procedure serves as a foundational document that guides all other Yakima Valley College (YVC) procedures, principles, and standards pertaining to Information Technology. Adheres to the Washington Technology Solutions (WaTech) IT Security Policies and Standards, guided by . 

This YVC IT Security Procedure is acknowledged as a "living" document that may require periodic updates to address changes in technology, applications, processes, legal and regulatory requirements, as well as emerging security threats and social factors.

This procedure applies to all members of the YVC community, with specific duties and responsibilities placed upon 鶹Ƶ. This procedure applies to all campus facilities, equipment and services that are managed by the YVC Technology Services Department, as well as off-site data storage, computing and telecommunications equipment. This procedure  also covers services provided by external vendors, including cloud-based solutions, internet-related applications, and connectivity.

YVC procedures aim to balance the need for security with the preservation of academic freedom and intellectual property rights, providing a framework for responsible and secure use of IT resources that supports the core educational mission of YVC.

YVC is committed to ensuring the protection, proper management, and secure use of IT resources. This procedure outlines the guidelines and responsibilities required to maintain the security and functionality of YVC’s IT assets. All members of the YVC community are responsible for following the practices outlined herein.

  1. Alignment with State Standards.YVC will adhere to WaTech IT Security Policies and Standards and TSB requirements to protect sensitive data and transactions within YVC and the SBCTC system.
  2. Compliance and IT Security Audit.YVC will document all processes in a comprehensive IT Security Audit, following WaTech's IT Security Audit Process. Compliance audits may be conducted internally or by independent auditors, such as the State Auditor, to ensure adherence to WaTech’s IT Security Audit and Accountability policy.
  3. Audit Results and Corrective Actions.Audit results will be reviewed internally and assessed by appropriate parties. Sensitive audit findings may be exempt from public disclosure per and
  4. Employee Awareness and Training.YVC will provide IT Security training for new employees and ongoing awareness training to protect technology resources.
  5. Annual Review and Updates.YVC will annually review and update security processes, policies, and practices to ensure they remain effective and current, especially after significant changes to business or technological environments.
  6. Confidentiality of Security Procedures.YVC will safeguard the confidentiality of IT security procedures, standards, and practices, handling distribution with consideration of risks and statutory exemptions from public disclosure (, ). It is the intent of YVC to take precautions to prevent the release of sensitive security-related information that could compromise the security of its IT environment, employees, or business operations.

  1. Maintaining an IT Security Audit. Technology Services maintains IT Security Audits on behalf of the college, which includes comprehensive documentation of all IT security processes as required by Washington State WaTech Policies.
  2. Providing Secure IT Solutions. Technology Services is responsible for providing YVC with secure business applications, services, infrastructure, and procedures that address the college's business needs while ensuring compliance with IT security policies and best practices.
  3. Enforcing Internal Security Standards. Technology Services follows and enforces internal security standards established for creating and maintaining secure access sessions to college applications and IT systems.
  4. Reporting Security Breaches. Technology Services may notify appropriate administrator(s) when an individual or individuals have knowingly compromised IT security on campus. Technology Services is not responsible for determining disciplinary action for violations of IT security policies, procedures, or standards. Disciplinary measures may be handled by the appropriate campus office, administrator, or local law enforcement, depending on the scope and nature of the violation.

Information Assets

‘Information assets’ are defined as any data stored, transmitted, or processed on behalf of YVC. This includes but is not limited to:
• Employee data
• Student personal data
• College operational and administrative data

Information assets may be in digital or physical form and must be protected according to YVC’s security policies and state regulations.

Information Technology (IT)

Information Technology (IT) encompasses all technological resources used to manage, store, process, and deliver information. This includes:
• Data
• Databases
• Hardware (computers, servers, etc.)
• Software
• Applications
• Web-based platforms and resources

IT resources are vital to YVC’s operations and must be secured to prevent unauthorized access and ensure their integrity.

IT Security Protecting the integrity, availability, and confidentiality of all information assets managed by YVC, ensuring that data is accurate, accessible to authorized users, and protected from unauthorized access, modification, or disclosure.
Safeguarding information assets from unauthorized release, alteration, or destruction, whether accidental or intentional. This includes protecting data from breaches, leaks, and attacks that could compromise its trustworthiness or availability.
Securing technology assets such as hardware, software, telecommunications, networks (infrastructure), and cloud-based resources, ensuring they are protected from unauthorized access, use, or disruption. This includes safeguarding against cyberattacks, data breaches, malware, and other vulnerabilities that could compromise system performance or data confidentiality.
Policy A policy refers to a formal course of action or set of guidelines prescribed by an organization. The purpose of the IT security policy is to ensure consistent and effective practices for safeguarding data, systems, and technology assets, guiding current and future decisions regarding information security.
Security Standard

A security standard is a rule or guideline established by WaTech (or the Information Services Board, ISB) that all state agencies, including YVC, must follow to ensure IT systems and data are secure. These standards are designed to provide a model for compliance, protect state assets, and enable effective security audits. They ensure that IT resources are used appropriately and securely in line with state requirements.

Technology Assets

‘Technology assets’ are defined as all software, hardware, or network infrastructure owned, managed, or operated by YVC. These assets include physical devices (e.g., computers, servers, networking equipment) as well as software systems and applications used for educational, administrative, and operational purposes.

Unauthorized Use

Unauthorized use refers to any action or access that violates YVC's policies, procedures, or standards for the use of campus technology. This includes any activity that is unlawful or violates local, state, or federal laws. Unauthorized use encompasses but is not limited to:

  • Accessing systems or data without permission
  • Using technology for activities not aligned with YVC’s goals
  • Engaging in activities that could damage, compromise, or misuse YVC’s technology or data resources
Washington Technology Solutions (WaTech)

WaTech (formerly the Washington State Department of Information Services or DIS) is responsible for overseeing the technology and information security policies for state agencies, including those pertaining to IT security and standards for the protection of data and systems.

  •  


Revision Log

Date By Notes
4/22/2025 B. Mugleston Revised links, RCWs, and clarified responsibilities.
8/08/2006  Jim Smith  New procedure

Procedure Contact:  Director of Technology Services


6.02 - Acceptable Use of Technology Resources

Update Approved by Administrative Council on April 22, 2025


Procedures

As a state agency, 鶹Ƶ (YVC) is responsible for overseeing the appropriate use of technology resources and ensuring compliance with state law.  This procedure provides college-authorized users and other users of college resources with guidelines for responsible and appropriate use of technology resources. Additional policies, procedures, standards, including those mandated by the institution, state, and/or federal law may also apply to the use of state assets. YVC reserves the right to determine, at any time, what constitutes appropriate use of state resources.

Public resources are entrusted by the State of Washington to YVC authorized users to further the public interest. Misappropriation of any YVC technology resources, equipment, services, or personnel for personal benefit undermines this trust and impedes fulfillment of the YVC mission.

At the same time, legitimate need exists for occasional, but limited exceptions to this general procedure. Where the use of YVC technology resources is reasonable in light of the legitimate needs and expectations of the YVC work force, neither the public trust nor campus efficiency suffers to any significant degree.

This procedure assumes that all YVC authorized users will act honestly, ethically,  responsibly and with good judgment to protect public resources and to fulfill the responsibilities identified in , which states

“…State officials and employees of government hold a public trust that obligates them, in a special way, to honesty and integrity in fulfilling the responsibilities to which they are elected and appointed. Paramount in that trust is the principle that public office, whether elected or appointed, may not be used for personal gain or private advantage."

The foundation for this trust is grounded in the personal responsibility of each YVC employee.

Users should understand that the college’s technology resources are the property of the state of Washington. While reasonable personal use is permitted under the de minimis use standard as outlined in, such use should not interfere with academic or work-related activities, violate any laws or regulations or result in additional costs to the college. The college reserves the right to monitor and restrict personal use, if necessary.

The use of YVC technology resources is strictly intended for use by YVC authorized users. This prohibits others, such as family members and friends, from using YVC-controlled technology resources for any purpose.

Additionally, the state specifically prohibits certain use, including:

The use of YVC technology resources is strictly intended for use by YVC authorized users. This prohibits others, such as family members and friends, from using YVC-controlled technology resources for any purpose. Additionally, the state specifically prohibits certain use, including:

  • Supporting, promoting, or soliciting for an outside organization, group, or business, unless authorized.
  • Promoting personal business interests or conducting private employment.
  • Political campaigning or lobbying, except under specific conditions.
    • College facilities may be used for political campaigning if rental costs are paid. Soliciting contributions on college property for political purposes is prohibited.
  • Personal political advocacy or promotion of personal religious organizations.
  • Commercial uses, such as advertising or selling.
  • Personal use of YVC email distribution lists.
  • Any illegal or unethical activity.
  • Infringement of copyrights.
  • Any form of harassment, including sexual harassment.
  • Discrimination based on race, creed, color, marital status, religion, sex, national origin, age, veteran’s status, sexual orientation, or disability.
  • Accessing, downloading, or disseminating inappropriate workplace materials, such as pornography or racist content.
    • This restriction does not apply if used for specific academic purposes.
  • Downloading software or files via the Internet for personal use.
  • Activities using excessive network bandwidth, such as downloading music.
    • This prohibition does not apply to students when directed by a faculty member for educational purposes.

Confidentiality, Retention and Access to Public Records

YVC employees should be aware that electronic communications (email, messaging, files, fax, voicemail) and YVC and third-party software and applications create reproducible electronic records, which are not private. These records are considered writings and may be public records subject to disclosure under Washington’s Public Disclosure Act ; or for audit and legitimate YVC operational purposes.

All electronic records are maintained according to state-approved retention schedules ( YVC Administrative Procedures 1.34 and 6.05). Public records are released upon request, as mandated by the Public Disclosure Law, which emphasizes full access to government information.

Any activity conducted by YVC employees using state resources is considered a public record and subject to disclosure, whether for official duties or other purposes. While exceptions exist, state law favors broad disclosure of public documents. Questions about public records or employee privacy should be referred to the College’s Public Records Officer (YVC Administrative Procedure 2.08).

Student education records are confidential and can only be released in accordance with the and the College’s administrative rules. Questions about student records should be directed to Student Services.

Policy Update Procedure

Procedure updates and policy changes related to Tech Services should be reviewed by both the Director of Human Resources and the Public Records Officer to ensure compliance with applicable laws, internal collective bargaining agreements, and regulations. This collaborative review ensures that all changes align with legal requirements and best practices.

Sanctions

Violation of any provisions of this procedure will be addressed in accordance with the college's policies, procedures, and standards. Disciplinary actions may include:

  • Disciplinary Action: Any disciplinary action will be taken in accordance with Human Resources procedures and/or applicable collective bargaining agreements.
  • Dismissal from the College: Violations may result in dismissal from the college.
  • Referral to the Washington State Ethics Board: Serious violations may be referred to the Washington State Ethics Board.
  • Legal Action: Legal action may be pursued where applicable.

Additionally, some violations of this procedure may constitute state, local, or federal criminal offenses and will be reported to the appropriate authorities.

De Minimis The use of technology resources is considered de minimis if the expenditure of state funds is negligible, the use is brief, infrequent, effective, and does not disrupt state business or other users, while maintaining the security and integrity of state property and information.
Official Duties Those duties within the specific scope of employment of YVC employees as defined by 鶹Ƶ, by statute, or by the Washington State Constitution.
Public Record "Public record" includes any writing containing information relating to the conduct of government or the performance of any governmental or proprietary function prepared, owned, used, or retained by any state or local agency regardless of physical form or characteristics.
Writing "Writing" means handwriting, typewriting, printing, photostatting, photographing, and every other means of recording any form of communication or representation including, but not limited to, letters, words, pictures, sounds, or symbols, or combination thereof, and all papers, maps, magnetic or paper tapes, photographic films and prints, motion picture, film and video recordings, magnetic or punched cards, discs, drums, diskettes, sound recordings, and other documents including existing data compilations from which information may be obtained or translated.
YVC Technology Resources Technology resources at a college encompass a range of digital tools, systems, and infrastructure including, but not limited to systems that support students, faculty, and staff in learning, teaching, research, and administration. These resources include hardware (like computers and printers), software (such as learning management systems and productivity tools), network and internet access, technical support services, media equipment, data storage, online learning platforms, and security systems. They are essential for enhancing academic experiences, enabling remote or hybrid learning, facilitating collaboration, and ensuring data protection across the institution.


Revision Log

Date By Notes
4/22/2025 B. Mugleston Reviewed, updated to current process
8/08/2006 Jim Smith New procedure

Procedure Contact:  Director of Technology Services


6.03 - Acceptable Use of YVC Computers

Update Approved by Administrative Council on April 22, 2025

鶹Ƶ (YVC) owns all YVC computing systems, networks and applications. This document is intended to provide college users with guidelines for responsible and appropriate utilization of these computing and technology resources. This procedure supplements the YVC Administrative Procedure 6.02 Acceptable Use of Technology Resources; all of its principles and other applicable YVC policies, procedures and/or standards that apply to the use of the assets defined in this document as well. YVC reserves the right to determine, at any time, what constitutes appropriate use of YVC technology resources and the YVC network resources, access, and/or services provided by YVC. This document also complies with the Technology Services Board (TSB) in Washington Tech Solutions (WaTech).

This procedure applies to all YVC employees, students and/or non-employees who may be authorized to use any YVC technology resources/network as defined by this procedure. No part of this procedure supersedes the YVC Administrative Procedure 6.02 Acceptable Use of Technology Resources. Its principles extend to and include any use of YVC technology resources, regardless of its location. YVC users shall also apply this procedure when using YVC technology resources/network to navigate through networks or computing systems beyond the local systems.

Use of the YVC technology resources, network, and data management systems shall be for the purpose of facilitating the exchange and storage of information, including information on students and/or employees, and compliance with and< furtherance< ofeducation, and< administrative missions of the college. The use of YVC technology resources/network will be consistent with the purposes and< objectivesof YVC andthe State Board for Community and Technical Colleges (SBCTC).

The goals of the Acceptable Use of YVC Computers/Network Procedure are to:

  1. Help assure the integrity and reliability of the YVC internal networks, hosts on those networks and any computing resource connected to them.
  2. Ensure the security and privacy of the YVC computer systems, networks and data. YVC Admin Procedure 1.34
  3. Ensure the protection and retention of sensitive college data.
  4. Establish appropriate guidelines for the use of YVC-owned technology, network, and YVC owned data whether accessed on and off- campus.

It is not the intent of this procedure to limit academic freedom, but to provide an appropriate framework for the proper exercise of those freedoms. Furthermore, it is not the intent of this procedure to impinge on the intellectual property rights of authorized users.

YVC employees, students and non-employees who are authorized to use YVC network and resources may:

  1. Use YVC owned computers, programs and data to which each individual has authorized access.
  2. Use computing and networking facilities and resources in a manner that is consistent with the mission and educational purpose of YVC.
  3. Use YVC provided networking, including access to the internet.

Requests for third-party access to stored electronic messages will be handled  through the college’s public record officer (see the procedure YVC Administrative Procedure 2.08 Public Records Request). YVC may be required to provide third parties with access to honor valid legal discoveries and public records requests.

Prohibitions

The use of YVC technology resources that violate  YVC Board Policy 1.05 Standards of Ethical Conduct or any other YVC policy, procedure, or standard, as well as state and federal rule, is strictly prohibited.

Specifically, the following actions are prohibited:

  1. Compromising Security: Attempting to breach, or assisting others in breaching, the security of any YVC network or technology resource, or facilitating unauthorized access.
  2. Malicious Software: Using YVC technology resources to create, distribute, or execute self-replicating or destructive programs (e.g., viruses, worms, Trojan horses, malware, ransomware).
  3. Impersonation and Deception: Engaging in activities that involve disclosing, impersonating, or masquerading (e.g., spoofing, pretending to be someone else).
  4. Unauthorized Access or Modification: Viewing, copying, altering, or destroying data, software, documentation, or communications belonging to YVC or another individual without proper authorization. YVC Admin Procedure 1.34
  5. Account Sharing: Allowing anyone, whether authorized or not, to use your login credentials or password to access YVC technology resources.

These procedures apply to all YVC employees, students and non-employees who may be authorized to use the YVC computing resources.

Under certain circumstances YVC employees may be authorized to take YVC-owned computing systems home for use in fulfilling their official duties.
1. TS technical support staff will perform the initial installation and software configuration.
2. All provisions for the use of state-owned equipment identified in the YVC Administrative Procedure 6.02 Acceptable Use of Technology Resources will apply.
3. All provisions of this procedure will apply.

Materials stored on the YVC network or on YVC computers are the property of the College and may be inspected at any time. Users are also reminded that these materials constitute a public record, which can be examined by members of the public if an appropriate request is received. Details regarding requests for stored data can be found in YVC Procedure 2.08.

Given sufficient cause, the Director of Human Resources, or his/her authorized designee, has the right to obtain access to materials stored on the YVC network which are under the control of YVC employees in their administrative units or work areas when such access is necessary to conduct YVC business. The Director, or his/her designee, will identify the specific materials required and the employee will be given sufficient opportunity to provide YVC with the requested materials. In the case of an emergency, best efforts will be made to contact the employee prior to accessing the specific materials required.

Any individual’s network use privileges may be suspended immediately upon the discovery of a possible violation of this procedure. Such suspected violations will be confidentially reported to the appropriate supervisors and/or administrators.

Authorized User This includes all YVC employees, students and non-employees who may be authorized to use the YVC network.
Disclosure This occurs when an unauthorized user gains access to information. Disclosure often occurs when messages are forwarded to unauthorized users.
Masquerading/Spoofing This is when a user presents himself/herself to the system as another user. This may be done in order to gain unauthorized access to information or resources, to disseminate (mis)information in anothers name, or to block or deny a system from operating correctly.
Software Unless otherwise stated, “software” refers to and includes all freeware, shareware, and third- party products, as well as commercially acquired products.
Unauthorized Access Includes gaining access to accounts, resources, messages, or files to which one is not granted privilege by the owner or sender.
YVC Data Management Systems This includes the Student Management System (SMS), Personnel and Payroll Management System (PPMS) Finance Management System (FMS) Financial Aid (FAID), Facility Management (FM1), Scheduling (R25) and individual databases created by individual departments or the college.
YVC Network This includes academic local area networks (LAN), the wide area networks (WAN) supporting sites separated from the main YVC campus, internet connectivity, networked infrastructure.


Revision Log

Date By Notes
4/22/2025 B. Mugleston Strengthening language, included component of cyber awareness, updated to current process. 
 08/08/2006  Jim Smith  New procedure

Procedure Contact:  Director of Technology Services


6.04 - Technology Equipment Replacement Plan

Approved by Administrative Council on April 22, 2025

Overview

鶹Ƶ's Technology Services Replacement Plan strives for equitable distribution, timely upgrades, and innovative technologies to support its mission of educating diverse learners.

Industry standards emphasize the importance of preventive system and device maintenance. Without regular maintenance, potential issues can arise, such as outdated network systems—including firewalls, routers, and switches—that cannot support newer technologies like VoIP, VDI, and faster wireless. Similarly, server and telephone systems may lack the necessary resources to handle newer operating systems and accommodate growth. Inefficient printing capabilities lead to high costs and compatibility issues, while the inability to meet future capacity needs could disrupt business processes. Additionally, aging hardware increases security and privacy risks, as it becomes unable to support essential security updates.

YVC TS is in the process of modernizing a formal replacement plan to include network equipment, endpoints (computers), server systems, printers, and classroom equipment. For example, in January 2023, Technology Services secured one-time funding to update its technology infrastructure. This funding has helped mitigate the risks outlined above.

Through the annual budget planning process, technological needs are identified and documented based on assessments, including feedback from Deans, end-of-life support dates, inventory reviews, and security requirements. Proposed new technologies are then evaluated by Technology Services staff to ensure they meet security, accessibility, and integration standards. Following this evaluation, proposals are reviewed by the appropriate administration for budget consideration and final approval.

Staff and faculty will typically be issued technology tools required for their specific job duties, including college computers when applicable, which will be assigned and distributed by Technology Services (TS). 

Equipment is typically provided through centralized technology funds, departmental budgets and/or grant funding. If extra technology beyond the campus standard is needed for varying computer needs, departments can present their case. 鶹Ƶ (YVC) Technology Services reviews requests individually, considering the equipment's age, life cycle, and current inventory to accommodate necessary technology.

To ensure a consistent and efficient work environment, the following standards have been established for computer and monitor/display provisions. Each employee whose position requires one computer will typically receive either a laptop typically accompanied by a docking station, or one desktop computer. Additionally, each employee will be supplied with one monitor, with size determined based on availability and job requirements (commonly 24 or 27-inch).  On occasion, a larger monitor is requested. While requests for additional monitors can be made, approval is not guaranteed and will be considered based on funding, specific job requirements, and accommodation. 

These standards aim to balance resource allocation with the diverse needs of our staff.  Requests for an additional or alternative device can be requested using the Additional Technology Device – Request.

The college draws from as a guiding framework, particularly in establishing its useful life schedule. Useful Life refers to the duration during which equipment can be utilized in the most technically efficient manner by the Technology Services organization, and is subject to change, as shown below.

Computer & Peripheral Equipment Life Cycle Network Infrastructure Life Cycle
Laptop 4-5 years Servers 5 years
Desktop 4-7 years Switches 6 years
Monitor End of life Routers, Wireless Hardware 6 years
Docking Station End of life Firewall 6 years

End of Life (EOL) The point at which a product is no longer supported by the manufacturer or is deemed no longer viable for use due to performance, compatibility, or security limitations. At this stage, equipment is typically retired or replaced.
Technology Tools Hardware, software, or cloud-based systems provided to support teaching, learning, administration, and communication. This may include computers, headsets, microphones, video cameras, printers, and access to licensed platforms like email, Learning Management Systems (LMS), collaboration tools, and other digital resources.
Useful Life The period during which a device or piece of equipment can be used efficiently and effectively by Technology Services before it becomes obsolete, fails to meet performance or security standards, or is no longer supported. This duration is subject to change based on emerging technologies, vendor support, and college needs.

see related Administrative Procedures in section 6.03 of this page. 


Revision Log

Date By Notes
4/22/2025 B. Mugleston New Procedure, replaced Acceptable use of YVC network and data management systems.

Procedure Contact:  Director of Technology Services


6.05 - Electronic Messaging Usage and Retention

Update Approved by Administrative Council on April 22, 2025


Guidelines

This procedure defines the framework for the use of electronic messaging systems and communications media by authorized users of 鶹Ƶ (YVC) that generate, store, transmit, and display correspondence for internal and external business communication purposes. It includes, but is not limited to, electronic mail (e-mail), voicemail, calendar scheduling systems, faxes, the internet, and other electronic media (i.e. Social media, SMS, text messaging, instant messaging).  This policy applies to all YVC data, user-developed data sets, and systems that may access this data, regardless of the environment where the data resides (including cloud systems, servers, personal computers, mobile devices, etc.), or the media on which data reside (including electronic, microfiche, printouts, CDs, external hard drives, etc.). It also applies regardless of the form data may take (text, graphics, video, voice, etc.), and includes guidelines for electronic messaging and records retention.

This procedure aims to balance the need for security with the preservation of academic freedom and intellectual property rights, providing a framework for responsible and secure use of IT resources that supports the core educational mission of YVC.

No employee, by virtue of their position, has any personal or property right to public records, even if they have helped develop or compile them. The  purposeful or deliberate misconduct regarding the destruction, removal, deletion, use, or falsification of college records is a violation of and constitutes a criminal offense. All electronic messages are subject to record retention requirements and are recognized by the courts as valid forms of evidence, making them subject to legal processes such as subpoenas. These records are governed by , the Preservation and Destruction of Public Records, as well as related legislation including the Public Records Act (42.56 RCW), Essential Records (), and Penal Provisions (). For further information, please reference Procedure 1.34 Records Management Program.

YVC has established IT Security Standards that outline the practices, processes, and controls for using YVC-provided electronic messaging systems. All YVC users are required to adhere to these procedures and standards.

  • YVC will provide electronic messaging systems, making them available to authorized YVC users as required subject to resources and other limitations.
  • YVC employees, students, and authorized users must take reasonable steps to prevent unauthorized access to electronic messages and protect data confidentiality and integrity. This includes maintaining password confidentiality, securing devices when unattended, and encrypting confidential or sensitive information before transmission, particularly when sending data to external agencies.
  • YVC Employees, students or other authorized users use of state-provided communication media is limited to YVC business.
    • YVC Employees, students or other authorized users are expected to use YVC-provided communications media only for YVC business. De minimis use is allowed under the state ethics procedures; see
    • YVC Employees, students or other authorized users shall not use YVC-provided communications media in a fashion that constitutes or involves any unlawful activity including but not limited to:
      • Discrimination on the basis of race, creed, color, sex, age, national origin, marital status, religion, disability, sexual orientation, or veteran’s status.
      • Harassment, sexual or otherwise.
      • Copyright infringement; or
      • Expression of an employee’s personal political beliefs or for personal business interests.
    • Electronic communications resources are limited, and employees must manage their allotted resources in a responsible manner.
  • All YVC information technology resources, including electronic messaging systems and files, are the property of the State of Washington. If the college is required to access an employee’s electronic messaging system pursuant to the Right to Access described in the YVC Administrative Procedure 6.03 Acceptable Use of the YVC Computers and Network, Human Resources will be responsible for providing the necessary information to the appropriate supervisor(s) and/or administrator(s).
    • YVC may, under certain circumstances and in the course of normal business functions, access an employee’s electronic messages without authorization from the employee.
      • YVC will monitor electronic messages only under the following guidelines:
        • If the Director of Technology Services (and/or his/her staff), who is responsible for the implementation, operation and maintenance of electronic message systems, needs to do so to monitor the flow, not the specific content, of electronic messages.
        • If, through other gathered facts, there has been sufficient cause to investigate the misuse of the system, or during the course of investigations where there is reason to believe illegal or inappropriate (as defined by policy) activity.
    • Electronic messages sent globally (e.g., to “*ALL”) must be appropriate for type and Examples of appropriate global messages are those that pertain to normal operations of YVC such as training and security alerts. For further consultation please contact Community and Public Relations.
    • Electronic communications media shall be managed in conformance with statutes and rules.
  • Management of the YVC’s electronic communications media shall conform to all applicable statutes and regulations governing public records, records retention and public disclosure. (See also YVC Administrative Procedure 2.08 Public Records Request.


Email Guidelines

This procedure provides guidance regarding record status, retention, and management of electronic mail (email) messages. Organizing and managing email (and other electronic files) will save space, provide more efficient access, maintain confidentiality where needed, and reduce legal exposure in "discovery" proceedings.

Email is just another public record. Formally, it is a document created or received on an electronic mail system, which includes brief notes, more formal or substantive documents, and any attachments that may be transmitted with the message. Messages and attachments should be filed and retained according to the legal retention required for the informational content of each (see Retention below). To assure appropriate retention of public records generated or received through an email system.  Electronic records must be retained in electronic format and remain usable, searchable, retrievable and authentic for the length of the designated retention period. Printing and retaining a hard copy is not a substitute for the electronic version unless approved by the applicable records committee. An agency is responsible for a security backup of active records. A security backup must be compatible with the current system configuration in use by the agency. 

Public records are defined (per ) as: "..."public records" shall include any paper, correspondence, completed form, bound record book, photograph, film, sound recording, map drawing, machine-readable material, compact disk meeting current industry ISO specifications, or other document, regardless of physical form or characteristics, and including such copies thereof, that have been made by or received by any agency of the state of Washington in connection with the transaction of public business..."

If any employee begins discussing YVC business on a personal cellphone (for example SMS, text messaging, instant messages, messaging apps), they should transition the conversation to a YVC work device to maintain proper recordkeeping and security standards. This ensures messages are securely stored, accessible, and searchable in compliance with retention and legal requirements. Public records must not be managed on personal devices unless explicitly authorized by policy. (See Admin Procedure 1.34)


Other Information

Confidential and sensitive information should not be sent via electronic messaging. The privacy and integrity of an email message cannot be guaranteed. Also, once created, there is no guarantee that attempts to erase or delete email will be effective. For more information on email encryption please contact Tech Services Help Desk.

All messages originated or transported within or received in the email system are considered the property of the agency. If requested by a member of the public, email will possibly be released. For further information, see the Public Records Act (), and the Ethics Board WAC (), (See also YVC Administrative Policy and Procedures 2.08 Public Record Requests and Board Policy 1.05 Standards of Ethical Conduct).Electronic copies (such as flash/USB drives) of deleted documents are also subject to the Public Records Act.

Like other forms of records, and regardless of retention requirements, electronic messaging pertaining to pending audits or judicial or public disclosure proceedings must not be destroyed until the appropriate retention period is satisfied. Until the legal hold has been removed, the public records request is closed, or it is no longer needed for an audit. 

Email messages are subject to the guidelines in and YVC Administrative Procedure 1.34 Records Management Program regulating the preservation and destruction of public records and as such are managed through records retention schedules.

  1. One of the greatest challenges of managing e-mail effectively is to ensure that all records, which originate or are transmitted through the system, are identified, retained, and managed properly. Records should be readily available and accessible to all authorized users when they need them and in a useable format. This means that the identity, purpose, and location of records are predictable, consistent, and reliable; methods for access and retrieval are simple and well defined; and records management practices are incorporated into day-to-day business activities.
  2. Records that must be retained should be segregated from transitory records that do not document YVC business, extra copies of documents, and drafts that do not reflect substantive changes. Because e-mail is easy to use for both formal and informational communications, the proliferation of informal and transitory messages that do not provide evidence of official policies and transactions is a common problem in e-mail systems. Messages with no retention value do not warrant the same degree of control, security, or protection, and they accumulate rapidly in e-mail systems.
  3. The content and not the medium determine the treatment of the message. E-mail records, like other YVC records, must be classified within the appropriate record retention schedule. For instance, all e-mail may be considered correspondence, but may include attachments such as reports, contracts, accounting records and so on. Please contact the and/or the college’s Records Officer to determine the retention period for your documents.

All users of the YVC network have a responsibility to comply with this procedure and to understand their responsibilities and all expectations as spelled out in the YVC Administrative Procedures 6.02 YVC Acceptable Use of Technology Resources and the YVC IT Security Standard 6.29 E-mail Accounts. This includes the requirement for confidentiality, retention and access to public records detailed there.

Violation of any of the provisions of this procedure will be dealt with in the same manner as violations of other college policies, procedures or standards, and may result in disciplinary review. In such a review, the full range of disciplinary sanctions is available, including but not limited to: 1. Disciplinary action – Any disciplinary action will be taken in accordance with appropriate Human Resources procedures; and/or applicable collective bargaining agreements 2. Dismissal from the college; and/or 3. Referral to the Washington State Ethics Board; and/or 4. Legal action. Some violations of this procedure may also constitute a state, local or federal criminal offense.  (See)

Communication It is defined as a system for sending and receiving messages, by mail and telephone.
Communications media The aspect of electronic messaging systems that contains the message.
Electronic messaging Refers to the exchange of digital messages through various electronic means, such as email, instant messaging, SMS, and other online communication platforms. It allows users to send and receive text, images, videos, and other multimedia content over the internet or cellular networks.
Employee A person who is a permanent, temporary, contractor, volunteer, and student intern employee or otherwise engaged at the agency and has been given authorized access to any agency electronic messaging system.
Encryption Is a method of “scrambling” data using a cryptographic algorithm based on a secret key that is known only to the originating system and the destination system.
Media It is defined as an agent by which something is conveyed, accomplished, or transferred.
Securing To log off the network, invoke a keyboard-locking feature requiring a password, or otherwise makes the device inaccessible.
SMS (Short Message Service) It is a text messaging service component of most telephone, internet, and mobile device systems. It allows users to send and receive short text messages between mobile phones or other devices. SMS operates over cellular networks using standardized communication protocols.
Transitory Records Transitory records only document information of temporary, short-term value, provided that the records are not needed as evidence of a business transaction. Transitory records include but are not limited to, secondary copies, blank forms, post it notes, whiteboards, flipcharts used for brainstorming, business cards, outlook contacts, catalogs, brochures.


Revision Log

Date By Notes
4/22/2025 B. Mugleston Reviewed, updated to current process
 08/08/2006  Jim Smith  New procedure

Procedure Contact:  Director of Technology Services


6.06 - Software Licensing Compliance

Update Approved by Administrative Council on May 6, 2025


Procedure

This procedure ensures that 鶹Ƶ (YVC) complies with all applicable software licensing agreements, laws, and regulations. The goal is to protect the institution from legal liability, safeguard institutional data, and promote responsible technology usage. This procedure supports YVC's strategic goals, state IT policies, and compliance with federal and state regulations, including FERPA, accessibility standards, and information security frameworks.

This procedure outlines YVC’s guidelines for the responsible use of copyrighted and licensed software, ensuring compliance with relevant copyright laws, licensing agreements, and institutional policies. It applies to all YVC employees, students, contractors, volunteers, and others who install, use, or manage software on any college-owned or personally owned devices used for college business. The procedure covers all software types, including on-premises, cloud-based (SaaS), open-source, freeware, and third-party hosted solutions, and extends to any YVC, State of Washington, or externally entrusted systems and networks.

This procedure is governed by , which defines the powers and duties of the State of Washington Information Services Board (ISB), including the authority to establish statewide policies, standards, and procedures for information services.

This procedure is intended to be in compliance with current ISB policy, . (the Copyright Act), and related laws, as well as the YVC Board Policy 3.01 Copyright. This procedure is intended to complement, not replace, those provisions. 

It also aligns with YVC procedures 6.01 Information Technology Security, 6.02 Acceptable Use of Technology Resources, 6.03 Acceptable Use of YVC, and 6.04 Acceptable Use of the YVC Network and Data Management Systems and additional policies, procedures and standards may also apply.

The use of YVC computing and network resources is intended to support the college’s educational, research, public service, and administrative missions. This procedure establishes a framework for the responsible and lawful use of software and technology resources without limiting academic freedom or infringing on the intellectual property rights of authorized users.

YVC is committed to responsible and lawful use of software. Appropriate licensing or written permission from software copyright holders should be obtained before using, installing, or copying software. This is typically accomplished through formal licensing agreements, or official documentation from the copyright owner outlining usage terms. While some software may not require separate written permission, usage rights are typically defined by a license agreement (EULA) or terms of service, which must be followed. For questions about specific software licenses, please contact the YVC Help Desk.

Copying, reproducing, transmitting, or installing software on YVC computing equipment is prohibited unless explicitly permitted by the applicable software license or authorized by this procedure. Software may not be installed or used on YVC systems without verifiable proof of legitimate ownership or licensing. The use of unlawfully obtained software on any YVC computing equipment is strictly prohibited.

鶹Ƶ (YVC) retains sole ownership of all software acquired with state funds or grants for which YVC serves as the fiscal agent. Additionally, YVC holds ownership of all data and software developed or modified by employees in the course of their assigned job responsibilities. Software or applications created independently by employees on personally owned devices for non-college use are not governed by this procedure. Any exceptions must be pre-approved through a formal agreement negotiated with the Vice President for Instructional Services prior to the initiation of development activities.

 

Revision Log

Date By Notes
5/6/2025 B. Mugleston Reviewed, updated to current practice 
8/8/2006 Jim Smith New procedure

Procedure Contact:  Director of Technology Services


6.07 - Computer Labs

Update Approved by Administrative Council on May 6, 2025


Purpose

鶹Ƶ (YVC) provides students with access to computing technology resources in numerous labs and computer classrooms throughout the college. Because the student population on campus is very dynamic and diverse, it is imperative that careful articulation of the policies, procedures, expectations, and standards for use of these resources be provided to them, and to the YVC staff and faculty who support those students in their educational endeavors. This procedure is intended to meet that imperative, and to provide all college users with guidelines for responsible and appropriate use of these college computing and technology resources.

This procedure supplements YVC Administrative Procedures 6.02 Acceptable Use of Technology Resources, 6.04 Acceptable Use of the YVC Network and Data Management Systems, and 6.03 Acceptable Use of YVC Computers. All of the tenets of those procedures, and any other applicable YVC policies, procedures, and/or standards apply to the use of the assets defined in this procedure. YVC, through its administrative representatives, reserves the right to determine, at any time, what constitutes appropriate use of YVC technology resources and the YVC network resources, access and/or any technology services (TS) provided by YVC.


Scope

This procedure applies to all YVC employees, students and/or non-employees who may be authorized to use any YVC computer labs, as defined by this procedure.

It is not the intent of this procedure to limit academic freedom in any way, but to provide an appropriate avenue for the proper exercise of those freedoms.

 

Revision Log

Date By Notes
5/6/2025 B. Mugleston Reviewed, to reflect how the labs are currently used 
8/8/2006 Jim Smith New procedure

Procedure Contact:  Director of Technology Services


6.08 - Computer Facilities Rental

Update Approved by Administrative Council on May 6, 2025


Purpose

The primary purpose of the 鶹Ƶ (YVC) computer labs, or technology facilities, is to provide computing technology resources for students, and to facilitate the exchange of information related to, and in furtherance of, the education, and administrative missions of the College.

The YVC 6.07 Computer Labs Procedure is the primary document governing the use of the YVC technology resources and the facilities housing them. Any renting entity and/or individual will follow its general principles and guidelines. In addition, this facilities rental procedure is provided to clarify the principles of that document and applies to all those who may be authorized by this procedure to rent any YVC computer labs.

Furthermore, all renters must agree to and abide by all other YVC policies, procedures, and standard, including the 6.02 Acceptable Use of Technology Resources Procedure, the Acceptable Use of the, 6.03 Acceptable Use of YVC Computers Procedure. Compliance with these procedures apply to those renting YVC facilities when using a YVC computer lab technology resource to navigate through networks or computing systems beyond the local YVC systems as well.

This document supplements the 6.02 YVC Acceptable Use of Technology Resources Procedure and the 6.3 YVC Computer & Network Procedure. All of the tenets of those procedures and any other applicable YVC policies, procedures, and/or standards apply to the use of the assets defined in this procedure. YVC, through its administrative representatives, reserves the right to determine, at any time, what constitutes appropriate use of the YVC technology resources and the YVC network resources, including any access and/or any computing services provided by YVC.

This procedure is not intended to limit academic freedom in any way but provides for the proper exercise of those freedoms.

No college facilities, including computer labs, computer classrooms and electronic classrooms, may be used by individuals or groups from outside the college unless the facilities have been reserved. The Office of Facilities Use Coordinator is authorized to schedule facilities, and consummate rental and use agreements.

As defined in the YVC Administrative Policy 3.02 on Facilities Use: Scheduling, the Director of Technology Services is assigned as the facility program manager for all computing resources on campus, and has primary responsibility for all aspects of the operation of computer labs on campus. The Director has the authority to interpret this procedure, all YVC IT security policies, procedures and standards, and any directives from the state or the college administration regarding computing labs, the physical and virtual facilities used to support the computing labs, and the YVC network.

In addition to those prohibited uses identified above, all limitations on the use of YVC facilities as defined in the YVC Administrative Policy 3.02 on Facilities Use: Requirements and Limitations apply to the use of the YVC technology facilities. These include limitations based on alcohol use, animals, commercial activities, disruption of college operations, interference with ingress and egress to college facilities, firearms and weapons, past abuses, political activity, public safety, sound amplification, and trespass.

Use of the computers in any YVC computing lab is controlled by login and password-secured accounts managed through the YVC network. Any non-student wishing to use the computers in any electronic classroom, computer lab or computer classroom should have YVC LABS Network login accounts created for them by Technology Services. These accounts will be created and distributed  following the processes described in the “Procedures” section below.

A YVC lab technician must be present during the scheduled time of use, to provide technical support.

The costs associated with this type of direct support for renters are defined in accordance with the YVC Facilities Use: Fee Schedule Policy. (Board Policy 3.02 Facilities Use, Appendix 3 – Fee Schedule)

Renters are granted policy security privileges, or access, to the computing equipment in YVC computer labs sufficient to accomplish their educational goals. The business impact of the request will be evaluated and balanced against the potential risk and threat to the YVC Network, using the YVC IT Security Standard 6.54 Security Privileges as a guideline.

All general lab rules spelled out in the 6.07 YVC Computer Labs Procedure apply to the use of rented computing facilities. The primary contact representing the renter will be given a copy of those rules upon signing the contract and will be held responsible for ensuring that the rules are observed.

In addition, there may be signs, posters, and/or announcements posted, either in print or electronically, at any YVC computing facility providing information deemed appropriate by the Director of Technology Services related to the use of that facility. Renters are expected to comply with all postings in all rented facilities.

The following rules are reiterated here to clarify any exceptions which apply to rented facilities.


Responsibilities

Renters of YVC computer labs must follow YVC IT Security policies and procedures, and comply with the instructions of the Director of Technology Services or their designee. They are responsible for any legal issues arising from their use of YVC technology. YVC, on the other hand, is responsible for providing the agreed-upon equipment and services, logging and monitoring network and computing systems, and informing renters about relevant policies and procedures.  Additional specific responsibilities include:

The Campus Security Office and Technology Services work together to enforce YVC policies for facility rentals. They make sure renters follow all rules and requirements, coordinating with other departments as needed.

Priorities for facilities scheduling will be in accordance with the YVC Policy on Facilities Use: Scheduling.


Procedures

These procedures apply to all renters who may be authorized to use the YVC Computing Labs. Compliance with these procedures will assure the continued integrity, reliability and availability of these resources.

Requests to schedule the rental of any YVC computing lab, computing classroom and/or electronic classroom should review the Facilities Use: Application and Agreement document.

Renter login accounts for YVC's labs and classrooms are created shortly before use and disabled immediately afterward. The renter's contact person will receive account details at the start of the event. These accounts have limited access and cannot interact with administrative networks or computers, with security measures ensuring this separation. 

Only authorized YVC Technology Services personnel or their designees can manage, install, upgrade, remove software, and repair YVC lab computers. Renters cannot install software unless it's part of the approved curriculum.
Violating this rule will result in loss of privileges and possible termination of the event, as per YVC's Facilities Use policy, and may lead to further action as outlined in the "Investigations" and "Sanctions" sections.
Additionally:

  • Illegal copying of software is prohibited and grounds for event termination.
  • Tampering with files or engaging in malicious mischief with hardware or software can lead to event termination and/or criminal prosecution.
  • Renters must not attempt to install software on lab systems.

Computers in YVC labs are configured for students' academic needs and include standard software like word processing, database, spreadsheet, presentation, and internet access programs.  See installation requests on 6.07.

Protection of YVC facilities and technology resources is a primary concern. Campus Security, or authorized designee, will be responsible for providing access to any rented facility. 

The college has the responsibility and authority for developing a facilities-use fee structure to appropriately compensate YVC for the use of its facilities. The YVC policy on Facilities Use: Fee Schedule governs this responsibility. (Board Policy 3.02.06 Facilities Use, Appendix 3 – Fee Schedule) All cancellations, changes to use agreements, billings, deposits and refunds will be handled in accordance with the YVC Board Policy 3.02 on Facilities Use.

All terms defined in the 6.02 Acceptable Use of Technology Resources Procedure are applicable in this procedure. In addition, the following are defined:

Lab Assistants These are individuals, generally students, assigned to a particular lab, whose purpose is to facilitate the general use of the lab. They are familiar with the equipment and software in that lab, enabling them to provide users with assistance. They are versed in YVC policies and procedures which apply to that lab and may have rudimentary technical troubleshooting skills. They refer to technical problems in labs to the YVC Support Technicians. Lab Assistants are not able, nor authorized, to perform software installations or equipment repair without direct supervision from Support Technicians, or the Computing Services Desktop Support Supervisor.
Support Technicians These are full or part-time employees of the college able and authorized to fully support all equipment in the computer labs.
Software Unless otherwise stated, “software” refers to and includes all freeware, shareware, and third-party products, as well as commercially acquired products.
YVC Network This includes the Administrative and Academic Local Area Networks (LAN), the Wide Area Networks (WAN) supporting sites separated from the main YVC campus, Internet connectivity, networked infrastructure devices such as hubs, switches and servers.
YVC Technology Resources Includes, but is not limited to, YVC-owned desktop, laptop or computer hardware or software; software licenses; workstations; data systems; personal digital assistants; electronic messaging systems; E-mail systems; pagers; telephones—both wired and cellular; SCAN services; voice mail systems; fax machines; YVC network resources, whether wire-based or wireless; Internet connections, accounts or access; and documentation photocopiers authorized by YVC to be used by employees, students and/or other campus users.
Unauthorized Access Includes gaining access to accounts, resources, messages or files to which one is not granted privilege by the owner or sender.


  •  

YVC Procedures


Revision Log

Date By Notes
5/6/2025 B. Mugleston Revised to established clear fee structure and updated to current process 
8/8/2006 Jim Smith New procedure

Procedure Contact:  Director of Technology Services


6.10 - Security Breach

Update Approved by Administrative Council on May 6, 2025


Purpose

鶹Ƶ (YVC) is committed to safeguarding the privacy, confidentiality, and security of personally identifiable information (PII) and other sensitive data it collects and manages. In accordance with the Revised Code of Washington (RCW) 42.56.590, and in alignment with state and federal data protection standards including NIST 800-171, YVC must notify affected individuals and appropriate authorities in the event of a security breach involving unencrypted personal information.

This procedure outlines the responsibilities and required actions for YVC employees around information security including when a data security breach is suspected or confirmed. It ensures that the college:

  • Complies with applicable privacy laws, regulations, and industry standards.
  • Responds quickly and effectively to minimize the impact of a breach.
  • Notifies individuals whose information may have been compromised, when required by law.
  • Preserves the availability, integrity, and confidentiality of institutional data systems.

This procedure applies to all YVC employees, departments, personnel, contractors, vendors, volunteers, and other authorized individuals or entities with access to
who access, process, or store personally identifiable information (PII) in digital or physical formats as part of their official college duties.

This policy governs information security preventative actions including the response to any actual or suspected breach of the security of YVC-managed or -contracted systems, devices, or storage media that contain PII, sensitive personal data, or protected institutional records.

A breach may include, but is not limited to:

  • Unauthorized access to or disclosure of data stored on YVC computing systems or networks.
  • Loss, theft, or unauthorized use of a physical device (e.g., laptop, mobile device, USB drive) containing sensitive information.
  • Compromise of cloud-based or third-party services managing YVC data.
  • Accidental exposure of data through misconfiguration or employee error.

This procedure supplements and does not replace applicable federal and state regulations governing data privacy and breach notification, including:

  • The Family Educational Rights and Privacy Act (FERPA) for student education records.
  • The Health Insurance Portability and Accountability Act (HIPAA) if applicable.
  • The Washington State Data Breach Notification Law (RCW 42.56.590).
  • Relevant standards under NIST SP 800-53 and 800-171 for incident response and data protection.

All YVC personnel are expected to comply with this procedure and any associated policies, including YVC Administrative Procedure 6.01 (Information Technology), and must report suspected breaches in accordance with the reporting procedures outlined herein.

鶹Ƶ (YVC) maintains computerized systems that process and store personal information, including data subject to federal and state privacy laws. In the event of a security breach involving unencrypted personal information, YVC is required to notify affected individuals when there is reasonable belief that an unauthorized party has acquired or accessed such information.

Notification Requirements

  • Timeliness of Notification
    YVC will issue a breach notification as quickly as possible, without unreasonable delay, following the discovery or confirmation of a breach. Notification must be consistent with:
    • The legitimate needs of law enforcement (if an investigation could be impeded, notification may be temporarily delayed at the request of a law enforcement agency); and
    • Measures necessary to assess the scope of the breach and to restore the integrity of the affected system(s).

  • Good Faith Access Exception
    Access to personal information by a YVC employee or official with a legitimate educational or business purpose does not constitute a breach, provided the data is not misused or subject to unauthorized redisclosure.

  • Technical Breach Exception
    YVC is not obligated to issue a breach notification if the security incident:
    • Involves encrypted data and the encryption key was not compromised.
    • Does not reasonably appear to pose a risk of identity theft, fraud, or other criminal misuse of the information.

YVC will follow notification protocols as required under RCW 42.56.590, including the content and format of the notice, and methods of delivery (e.g., email, postal mail, website posting, or notification to major media, depending on the scope of the breach).

All 鶹Ƶ (YVC) employees and designated school officials are responsible for understanding and complying with this procedure. Certain administrative units carry additional responsibilities for the ongoing maintenance, enforcement, and communication of this policy.

  • Individual Responsibilities
    All YVC school officials and employees must:
    • Promptly report any suspected or confirmed data breaches or security incidents in accordance with this procedure.
    • Participate in relevant training or awareness efforts regarding breach response protocols.
    • Comply with all provisions of state and federal law, YVC policies, and this procedure when handling personal or sensitive data.
  • Policy Maintenance and Oversight
    • Technology Services (TS)
      • The Director of Technology Services in collaboration with the TS Information Security Officer (ISO), or their designees, holds primary responsibility for maintaining and administering this procedure.
      • TS is responsible for:
        • Drafting and updating the procedure in consultation with the Administrative Council.
        • Conducting a formal review process, including appropriate campus stakeholder input.
        • Submitting final updates to the college president for approval.
        • Publishing the approved procedure and communicating changes across campus, including an overview of the implications for employees and other affected parties.
  • Human Resources (HR)
    • The Chief Human Resources Officer is responsible for:
      • Reviewing proposed updates or changes to this procedure to ensure alignment with institutional HR policies and employee responsibilities.
      • Providing input regarding the implications of the policy for college personnel.
      • Coordinating response protocols involving employee conduct or performance, as applicable.

鶹Ƶ provides information technology systems and services to support its educational, administrative, and operational functions. While the College takes reasonable measures to secure its systems and protect data, it makes no warranties, express or implied, regarding the availability, performance, or security of its computing systems, electronic communications, or network resources.

To the extent permitted by law, 鶹Ƶ shall not be liable for any direct, indirect, incidental, or consequential damages resulting from the use, misuse, or inability to use college-operated or college-contracted information technology resources, including those arising from security incidents, breaches, or data loss.

  • Initial Discovery and Reporting
    Any individual who discovers or is informed of a potential incident/breach involving YVC technology systems that may result in the unauthorized acquisition of computerized personal information must immediately notify the YVC Help Desk.
    Upon receipt of the report, the Help Desk will promptly escalate the incident to the IT Security Administrator or their designee for evaluation.

  • Investigation and Assessment
    The TS ISO or designee is responsible for:
    • Initiating a breach investigation with technical representatives from Technology Services (TS).
    • Assessing the nature and scope of the potential breach.
    • Notifying the Director of Technology Services or designee of the incident and preliminary findings.

If the breach involves the physical loss or theft of a device or storage medium containing personal data, the Campus Security Office will also be notified.
All investigations will follow the protocols outlined in YVC IT Security Standard 6.37: Intrusion Detection and Incident Response.

  • Coordination and Law Enforcement Notification

    The Director of Technology Services, or designee, in consultation with the IT Security Administrator, will:

    • Determine whether the incident requires notification to law enforcement.
    • Coordinate with Campus Security.
    • Designate the IT Security Administrator or designee as the primary liaison with any law enforcement agencies involved.

  • Breach Report and Documentation
    The TS ISO or designee will submit a formal report to the Director of Technology Services within seven (7) calendar days of the discovery of the breach. The report will detail:
    • The nature of the incident
    • The scope and types of personal information involved
    • Systems or devices affected
    • Actions taken to mitigate the breach

  • Disclosure Determination and Notification

    If it is determined that unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person, the Director of Technology Services will consult with:

    • The Chief Human Resources Officer
    • The Vice President of Instruction, Vice President of Student Services
    • The President of the College

Together, they will determine:

    • Whether notification to affected individuals is warranted
    • The appropriate method and content of notification, as required by RCW 42.56.590.
  • Notification Methods
    If disclosure is required, notification to affected individuals will occur without unreasonable delay, consistent with any law enforcement needs and investigative efforts. Notification may be made through one or more of the following methods:
    • Written Notice
      Delivered via U.S. mail to the last known address of the affected individual.
    • Electronic Notice
      If consistent with the provisions regarding electronic records and signatures under the Electronic Signatures in Global and National Commerce Act (15 U.S.C. § 7001).
    • Substitute Notice
      May be used only if:
      • The cost of providing direct notice exceeds $250,000, or
      • YVC lacks sufficient contact information to provide direct notice.

Substitute notice must include all of the following:

    • Email notice (if available)
    • Conspicuous posting of the notice on the YVC website
    • Notification to major statewide media outlets

Breach of the Security of the System Unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by YVC.
Personal Information Defined by statute as an individual’s first name or first initial and last name in combination with one or more of the following: a) Social Security number; b) Driver’s license number or Washington ID card number; c) Account number or credit/debit card number in combination with any required access/security code or password. Does not include public information made lawfully available from government records.
Computerized Data Any data that is stored, processed, or transmitted in a digital format by a computing device, system, or network.
Unauthorized Acquisition Access, download, viewing, copying, or transmission of data by an individual or system not authorized to access such data, whether intentional or accidental.
Encryption A method of converting data into a code to prevent unauthorized access. Data is considered encrypted when it is rendered unusable without a decryption key or password.
Good Faith Acquisition Access to personal information by a YVC employee or agent with a legitimate educational or business interest and without intent to misuse or improperly disclose the information.
Substitute Notice An alternative method of notification when direct notice is impractical, involving a) email notice; b) conspicuous website posting; and c) notification to major statewide media.
Security Breach A confirmed incident in which sensitive, protected, or confidential data has been accessed or disclosed in an unauthorized manner.
Law Enforcement Agency Any local, state, or federal agency authorized to enforce laws and investigate criminal activity.
Help Desk The YVC point of contact within Technology Services for reporting technology-related issues, including suspected security breaches.

  •  YVC IT Security Standard 6.37 – Intrusion Detection and Incident Response
    Provides technical guidance for identifying, responding to, and reporting security incidents that may impact the confidentiality, integrity, or availability of YVC’s information systems.
  • Family Educational Rights and Privacy Act (FERPA):
    Federal law that protects the privacy of student education records and governs the conditions under which information can be disclosed.
  • 15 U.S.C. § 7001 – U.S. Code General Rule of Validity (Electronic Signatures in Global and National Commerce Act)
    Establishes the legal validity of electronic records and signatures, applicable to electronic notification methods.
  • RCW 42.56.590 – Personal Information:
    Washington State statute requiring notification when certain types of unencrypted personal information are reasonably believed to have been acquired by an unauthorized person.


Revision Log

Date By Notes
5/6/2025 B. Mugleston Included references NSIT, Cybersecurity and HIPPA. Updated to current practices.
8/8/2006 Jim Smith New procedure

Procedure Contact:  Director of Technology Services


6.11 - Data Transfer

Update Approved by Administrative Council on May 6, 2025


Introduction

This procedure establishes the required steps to ensure secure and compliant transfer of data in accordance with 鶹Ƶ’s (YVC) Information Technology (IT) Security Policy. It applies to all transfers of data—digital or physical—between YVC and internal or external entities, including third-party vendors, government agencies, and institutional partners.

The purpose of this procedure is to safeguard personally identifiable information (PII), confidential records, and other protected institutional data during transmission, storage, and disposal, in alignment with applicable laws, regulations, and standards.

This procedure is subject to review at least annually or whenever significant changes occur in technology, business practices, or regulatory requirements that may affect the security or integrity of data transfers.

This procedure defines the technical, administrative, and procedural requirements for the secure transfer of data from 鶹Ƶ (YVC) to internal departments or external entities, including vendors, partners, and government agencies.

It applies to all methods of data transmission—such as electronic transfer, physical media, and cloud-based platforms—where YVC data is shared outside its originating environment.

This procedure incorporates protocols and configurations developed in coordination with Washington Technology Solutions (WaTech), the state’s centralized technology services agency, for secure and compliant transmission of data from YVC production systems.

Certain exceptions to this procedure may be necessary based on specific technical constraints, platform limitations, or business requirements. All exceptions granted must be formally documented and submitted to the YVC IT Security Administrator, who will retain a record of the exemption.

Each exemption request must include:

  • A detailed description of the exception.
  • A justification explaining why the exception is necessary, such as platform limitations or essential business needs.
  • A description of compensating controls implemented to mitigate any risk associated with the exception.
  • A risk assessment conducted by the YVC IT Security Administrator and/or the Director of Technology Services.

鶹Ƶ (YVC) partners with the Center for Internet Security (CIS) in the development and maintenance of a significant portion of the college’s administrative application systems. This collaboration also supports various aspects of data management across the institution.

Additionally, YVC regularly transmits institutional data to third-party vendors, government agencies, and other business partners. Given the sensitivity of certain datasets, proper handling and secure transmission of this information is critical.

The most significant risks associated with these data flows include:

  • Malicious and/or unauthorized disclosure of information
  • Malicious and/or unauthorized modification or deletion of information
    The primary concern related to these administrative systems is unauthorized access—whether through data disclosure or manipulation—which could result in fraud, data breaches, or violations of institutional policy and regulatory requirements.

General
When transferring production data to a business partner that is not a member of the Washington State Board for Community and Technical Colleges (SBCTC), Yakima Valley College (YVC) must ensure the confidentiality, integrity, and security of the data throughout the transfer process.

All data transmitted over public or untrusted networks must be encrypted in transit using strong, industry-standard encryption protocols. These protocols must align with the current Washington State Office of Cybersecurity (OCS) policies and applicable federal standards, such as NIST Special Publication 800-52 and FIPS 140-3.

For any external data sharing arrangement, whether governed by a contract, service-level agreement (SLA), or a standalone data sharing agreement, a formal Data Sharing Agreement must be executed. See Appendix A for the required Data Sharing Agreement template. 

This agreement must explicitly address the following elements:

  1. Type of Data to be Shared – Including a description of the data and its source.
  2. Data Classification Level – As defined by YVC’s data classification policy (e.g., Public, Confidential, or Restricted).
  3. Method of Access or Transmission – Including technical details of the transfer method (e.g., SFTP, VPN, encrypted email).
  4. Authorized Personnel or Roles – Identifying individuals or job functions permitted to access the data.
  5. Security Measures – Detailing how the data will be protected in transit and at rest.
  6. Data Disposition Plan – Describing how the data will be securely deleted or returned to YVC once it is no longer required for the contract’s purpose.

Data requests will be classified as one of two types: Internal or External.

  • Internal requests (YVC), require a Data Sharing Request form only and will adhere to all applicable standards.
  • External requests (non-YVC entity), require both a YVC Data Sharing Request form and YVC Data Sharing Agreement to be completed and will adhere to all applicable standards. 

Whether for internal or external use, all data transfers must comply fully with the following secure handling practices:

  • Access Control:
    Protected data must not be stored on any shared drive or server space accessible to users who are not authorized to access the information.
  • Data Deletion:
    Protected data must be deleted from any local workstation drive as soon as practical after its immediate use is complete.
  • Data Encryption at Rest:
    • When not in immediate use, any protected data copied from its original secure location and stored on any form of storage media (including workstation drives) must be encrypted using a strong, industry-standard encryption algorithm in accordance with YVC IT Security Standard 6.71 – Encryption.
    • Encryption is mandatory for protected data stored on portable storage devices, including but not limited to:
      • Laptops and tablets
      • USB flash drives
      • External hard drives
      • DVD/CD-ROMs
      • SD cards and other removable media

    • Additional guidelines are provided in YVC IT Security Standard 6.52 – Portable Storage Devices.

  • Data Encryption in Transit:
    Encryption is required for all protected data transmitted across public or untrusted networks. The specific method depends on the type of transfer:
    • If encryption is required during interactive sessions (e.g., remote access), the guidelines in this procedure must be followed.
    • If state or federal regulations mandate encryption of other YVC data—even if not labeled “protected” by policy—those requirements must also be followed.
    • Both endpoints in any electronic transmission must be verified as secure. If assurance cannot be obtained, a physical transfer method (e.g., encrypted USB) is preferred.
    • All electronic transfers of protected data must include confirmation of receipt by the intended recipient:
      • If the method of transfer (e.g., secure file transfer) includes automatic confirmation, this is sufficient.
      • If no built-in confirmation exists, a separate confirmation must be obtained (e.g., via email or phone).

Email is one of the most common methods of modern data transmission. Yakima Valley College (YVC) has implemented a secure email system that enables communication with external entities while supporting confidentiality and data integrity requirements. When transmitting any data via email, the following standards apply:

  • Use of Authorized Email Accounts
    • All email transmissions of protected data must originate from YVC-provided campus email accounts.
    • Personal email accounts (e.g., Gmail, Yahoo, Outlook.com) and email systems not hosted or managed by YVC must not be used to transmit protected information under any circumstances.
  • Encryption Requirements
    • Protected data must be encrypted prior to transmission via email.
      This includes both the email body and any attachments containing protected data.
    • Only encryption tools and protocols authorized by:
      • YVC IT Security Standard 6.71 – Encryption, or
      • Approved directly by the YVC IT Security Administrator may be used for email encryption.

  • Recipient Access Control
    • Encryption mechanisms must be configured such that only the intended recipient can decrypt and view the email content.
    • The encryption method must prevent unauthorized third parties from accessing the data in its original, unencrypted form.
  • Email Archiving and Access
    • Email messages (whether encrypted or not) must be retained in accordance with YVC Administrative Procedure 6.05 – Electronic Messaging and Retention.
    • YVC email systems will be configured to allow IT support personnel to decrypt YVC-generated email messages if required for administrative, security, or legal purposes.
      • Decryption by someone other than the original sender may only occur with prior authorization from the Director of Technology Services or a designated authority.

For data submitted via secure web portals—such as those operated by the Social Security Administration (SSA), Internal Revenue Service (IRS), or U.S. Citizenship and Immigration Services (USCIS)—YVC requires the following controls:

  • Encrypted Transit
    •  All data submitted via web portals must be transmitted using strong, industry-standard encryption protocols, such as TLS 1.3 or higher, to safeguard data integrity during transfer.
  • Secure Workstation Handling
    • Web uploads must be performed exclusively from authorized, security-hardened workstations.
    • Any files downloaded for transfer are considered sensitive and must be handled in compliance with YVC’s endpoint security policies, which ensure that the data is not exposed to unauthorized access.

  • No Shared Storage
    • Local copies of transferred data must never be stored on shared drives.
    • Files should be securely deleted from the workstation immediately after the transfer is complete, ensuring no residual data is left on unsecured storage locations.

  • Audit Logging
    • Each transfer must be logged to maintain an accurate record of data handling, which includes:
      • The user’s identity performing the transfer
      • Date and time of the transfer
      • Destination system where the data was transferred
      • File details including file names, sizes, and types.
    • These logs must be stored according to YVC’s data governance and audit requirements to ensure transparency and accountability.

鶹Ƶ (YVC) supports secure, automated file exchanges with external partners using the following protocols. All transfers must adhere to these requirements:

  • Protocol Usage:
    • SFTP (SSH File Transfer Protocol) is the preferred method for all bulk or scripted transfers.
    • FTPS (FTP over TLS) is permitted only when SFTP is unavailable and explicitly required by the partner.
  • Network Controls:
    • Firewall rules must restrict access to the minimum set of authorized IP addresses and ports necessary for the transfer.
  • Authentication & Credentials:
    • Credentials and keys must be managed in accordance with YVC IT Security Standard 6.49 – Password Management.
    • Public key (RSA or ED25519) authentication is strongly encouraged for SFTP. Any use of unprotected private keys (e.g., without a passphrase) must be documented as an exception through the Exemptions process.
  • Encryption & Integrity:
    • All data in transit must be encrypted using strong algorithms
    • For highly sensitive datasets, file level encryption and digital signing with PGP/OpenPGP/GNU GPG may be employed as an additional layer of protection.
  • Logging & Audit:
    • Every transfer must be logged, capturing user identity, date/time, protocol, source and destination endpoints, and file details.
    • Logs must be retained and periodically reviewed according to YVC’s data governance and audit policies.
  • Exceptions:
    • Any deviation from these requirements must be processed through the formal Exemptions procedure, including a documented risk assessment and compensating controls.

The Director of Technology Services (or their designee) may approve alternative, industry standard methods for secure data transfer, provided they meet YVC’s requirements for encryption, authentication, integrity, and audit logging. These methods may include, but are not limited to:

  • Secure Web/Application Protocols (e.g., HTTPS)
  • Secure multipurpose mail extensions (e.g., S/MIME or PGP/OpenPGP)
  • Virtual Private Networks (VPNs using certificate based or multi factor authentication)
  • Other approved technologies that align with YVC’s security standards
    All authorized methods must be documented, and any deviations or special approvals processed through the Exemptions procedure.

Data may be transferred to business partners via physical media only when no secure electronic transfer option is available. All physical media (e.g., USB drives, DVDs) and containers must be clearly labeled to indicate they are property of YVC and contain confidential information. If printed reports are included, they must:

  • Have a cover sheet labeling the contents as confidential and YVC-owned.
  • Preferably include confidentiality markings (e.g., header, footer, or watermark) on each page.
    Instructions for secure handling and disposal of media must accompany the delivery—either on the media itself or via a cover letter—and must comply with YVC IT Security Standard 6.44: Media Disposal.

Violation of this procedure or any YVC IT security standards will be addressed promptly. Users who misuse or abuse computing or network resources may face disciplinary action, which may include temporary or permanent suspension of access, account deactivation, and/or other administrative measures. Serious or repeated violations may result in additional consequences in accordance with college policies, employment agreements, or applicable laws and regulations. Some violations of this procedure may also constitute a state, local, or federal criminal offense.

  • YVC Administrative Procedure 6.03 Acceptable Use of YVC Computers
  • YVC Administrative Procedure 6.04 Acceptable Use of YVC Network and Data Management Systems
  • YVC Administrative Procedure 6.05 Electronic Messaging and Retention YVC IT Security Standard 6.28 Electronic Mail Configuration
  • YVC IT Security Standard 6.44 Media Disposal
  • YVC IT Security Standard 6.49 Password Management
  • YVC IT Security Standard 6.52 Portable Data Storage Devices YVC IT Security Standard 6.70 Data and Information Security YVC IT Security Standard 6.71 Encryption

 References:

  •  

 

Revision Log

Date By Notes
5/6/2025 B. Mugleston Reviewed, updated to current practice. 
9/8/2020 Dilbar Chhokar Update language and added definition of personal identifiable information
1/22/2008  Scott Towsley Standard 6.31 changed to Procedure 6.11 Data Transfer

Procedure Contact:  Director of Technology Services


6.12 - Copiers

Update Approved by Administrative Council on May 6, 2025


Purpose

This procedure outlines the processes and responsibilities for managing and maintaining copiers located at 鶹Ƶ (YVC) campuses and Learning Centers (hereinafter referred to as “the college”). It is intended to ensure consistent, cost-effective, and secure copier operations across all locations. This procedure applies specifically to networked and shared copier devices and does not apply to desktop or personal printers.

Technology Services (TS) oversees the acquisition, placement, and ongoing support of all copiers and copier maintenance agreements at 鶹Ƶ. All copier purchases and lease agreements must be coordinated through Technology Services to ensure consistency, security, and cost efficiency.

Copier features are standardized based on college-wide needs and typically include the following capabilities:

  • Print
  • Copy
  • Scan
  •  Fax
  • Staple
  • Collate
  • Duplex (double-sided printing)
  • Audit coding for usage tracking
  • Maintenance contract (includes vendor support and toner replacement)

Technology Services will conduct periodic reviews of copier usage and performance, gathering input from departments to assess evolving needs and determine whether adjustments or upgrades are necessary.

鶹Ƶ will assume the cost of copiers and their associated maintenance agreements for standard institutional use. However, exceptions apply under certain conditions as outlined below.

The following categories of copier usage are excluded from centrally funded support. In such cases, costs—including equipment acquisition and ongoing maintenance, will be the responsibility of the requesting department, program, or external entity:

  • Supplementary Copiers
    • If a department or program requests an additional copier beyond what has been provided by Technology Services, the department shall:
      • Obtain approval from their supervisor, dean/director, and corresponding vice president.
      • Submit the request to Technology Services for review. The requesting department or program should be responsible for the cost of the copier and its maintenance agreement. Monthly billing will be charged accordingly.
  • Self-Supported or Specially Funded Copiers
    • Copiers that are self-funded or associated with specific funding sources are not covered by general college funds. These include, but are not limited to:
      • Coin-operated copiers
      • Copiers purchased with program-specific or grant funds
      • Copiers used by the Associated Students of 鶹Ƶ (ASYVC)
      • Copiers located in instructional areas for student use
      • Copiers used in tutoring centers
      • Copiers used by the YVC Foundation
        (Note: Technology Services will bill the Foundation directly for monthly usage.)

For all applicable exceptions, billing will be forwarded to the designated program, department, or account holder for payment.

Technology Services:
Technology Services is responsible for the overall management, coordination, and support of copiers across all 鶹Ƶ campuses and learning centers.  Specific responsibilities include:

  • Evaluating copier needs across the college by gathering input from users.
  • Maintaining an up-to-date inventory of copier needs and placements.
  • Procuring college copiers, including negotiating maintenance agreements.
  • Collecting monthly meter readings and submitting them to the appropriate vendors for billing.
  • Processing and forwarding internal billing to the relevant departments and programs.
  • Preparing copiers before deployment.
  • Networking and configuring devices to ensure access for authorized YVC employees.
  • Issuing user codes, when feasible, for devices with audit locking features.

Users:
Contacting the designated copier contact when the device indicates a need for toner replacement or requires service.

Designated copier contact:

  • Calling the vendor support number posted on the device when toner replacement is needed.
  • Contacting vendor support for any copier malfunctions or operational issues.
  • Submitting a ticket (Technology Services work order) for all vendor service calls. The ticket must include the copier’s Service ID and location for tracking and accountability.


Revision Log

 Date By  Notes
5/6/2025 B. Mugleston  Reviewed, updated to current practices. 
 10/26/2010 . Towsley/A. Rodriguez Newly created procedure.

Procedure Contact:  Director of Technology Services


6.13 - Accessibility Compliance

Approved by Administrative Council on May 6, 2025

Introduction

鶹Ƶ (YVC) is committed to providing equitable access to its educational programs, services, and activities in compliance with federal and state laws, including the Americans with Disabilities Act (ADA), Section 504 of the Rehabilitation Act, and Washington State Policy 188. This commitment extends to the procurement, development, implementation, and maintenance of electronic and information technology (EIT), ensuring that accessibility is proactively integrated.

YVC aims to eliminate barriers that may prevent individuals with disabilities from accessing digital resources. The college fosters a learning and working environment that is inclusive, welcoming, and designed to support the success of all students, faculty, and staff. Ensuring access to EIT is a shared responsibility, and all members of the YVC community are expected to contribute to making technology accessible and usable for everyone.


Purpose

This procedure establishes YVC’s standards for ensuring that EIT is accessible to individuals with disabilities. It outlines expectations for the creation, acquisition, and maintenance of accessible EIT across all college operations.

These procedures apply to the following key areas:

1. Instructional Materials Accessibility – Ensuring that course content, including syllabi, handouts, videos, and learning management systems, is accessible to all students.
2. Document Accessibility – Creating and distributing digital documents (e.g., PDFs, Word, Excel) that are perceivable, operable, and usable by people with disabilities.
3. Electronic Media Accessibility – Ensuring multimedia content (e.g., audio, video, podcasts) includes captions, transcripts, and other accessible formats.
4. Web Accessibility – Maintaining websites, web applications, and online services in compliance with Web Content Accessibility Guidelines 2.1/2.2 standards.
5. Procurement of Accessible Software, Hardware, and Systems – Requiring accessibility to be considered when purchasing or renewing technology products or services.

Electronic instructional materials—such as syllabi, textbooks, presentations, handouts, multimedia content, and digital tools—are accessible to all students, including those with disabilities. This includes materials delivered through the learning management system (LMS), in face-to-face settings, or through alternate methods such as email, blogs, or collaborative platforms.

Electronic instructional activities (e.g., online discussions, collaborative writing, web conferencing, or group work tools) must also be accessible, effective, and usable for individuals with disabilities, providing the same functionality and learning outcomes as those experienced by individuals without disabilities.

All instructional materials and activities, whether optional or required, must be made available to students with disabilities at the same time as they are available to others.

Responsibility

Faculty and Instructional Staff:

  • Shall follow the accessibility requirements outlined in these procedures when creating and using instructional materials.
  • Shall ensure that third-party instructional materials, including open educational resources (OERs) and tools used by students in a course are accessible.
  • Should consult with YVC’s instructional design, accessibility  coordinator, or Technology Services teams when evaluating or selecting third-party content.

 Library:

  • Shall maintain an accessible library management system, including an accessible search engine that enables users to search across all collections—such as databases, e-journals, and e-books—in accordance with WCAG 2.1 AA standards.
  • Shall, with support from the Accessibility Coordinator, collect and verify current Voluntary Product Accessibility Templates (VPATs) or Accessibility Conformance Reports (ACRs) from library database vendors. These documents must be reviewed for completeness, accuracy, and conformance with WCAG 2.1 AA success criteria.
  • Shall ensure that library research guides (e.g., LibGuides) are accessible. With support from the Accessibility Coordinator, the library will review guides created by campus community members. If accessibility corrections are needed, content authors will be notified and provided with reasonable timelines to make the necessary revisions.

 eLearning:

  • Shall, with support from the Accessibility Coordinator provide guidance and training to faculty, staff, and other campus community members on creating accessible online courses and instructional content.
  • Shall ensure that online instructional activities are hosted in an accessible learning management system (LMS) that complies with WCAG 2.1 AA standards and supports accessible content delivery.

Technology Services:

  • Shall ensure that only accessible electronic and information technology (EIT) is installed and supported in Technology Services–designed classrooms and instructional spaces.
  • Shall serve as a central resource for information about assistive technologies and recommended modifications for departmental computer labs, in consultation with the Accessibility Coordinator.
  • Shall verify that all campus-developed applications (web-based, desktop, or otherwise) meet accessibility standards, including WCAG 2.1 AA, WAI-ARIA 2.0, and ATAG 2.0.

Departments and programs:

  • Shall verify that all instructional materials used within their units comply with the accessibility requirements outlined in these procedures.
  • Shall make sure that assigned classrooms are equipped with technology that is accessible to all users, including individuals with disabilities.
  • Shall confirm that departmental computer labs designated for student use are equipped with appropriate assistive technologies, such as accessible computer stations, screen readers, screen magnification tools, and other necessary accommodations.

College-produced and maintained or distributed conventional electronic documents should be accessible. Conventional electronic documents include word processing documents, Portable Document Formats (PDF), presentations, and spreadsheet files that are scanned, uploaded, posted, or otherwise published or distributed electronically. Electronic interaction with college policies, procedures, notifications, and other conventional electronic documents should be as effective and usable for people with disabilities as it is for people without disabilities. Conventional electronic documents should follow and use standards and guidelines outlined in the , as a guiding framework, published by the World Wide Web Consortium (W3C).

Responsibility

Accessibility Coordinator & Campus Accessibility Work Group:

  • Should work with all departments and programs to ensure conventional electronic documents, including PDF, Word, Excel, and PowerPoint files, are accessible.
  • Should compile and maintain data to track compliance with these procedures and make recommendations for addressing any challenges.
  • Should collaborate with Technology Services, DSS, Library, and eLearning to coordinate campus-wide PDF solutions.
  • End users are encouraged to use accessibility checkers when integrated into software.

eLearning/Library in collaboration with Accessibility Coordinator:

  • Should implement procedures to ensure that materials digitized or hosted by the library for research purposes are accessible to individuals with disabilities.

Departments and programs in collaboration with Accessibility Coordinator:

  • Shall follow the accessibility requirements outlined in these procedures when creating, using, and distributing conventional electronic documents, such as Word documents, PDFs, presentations, and spreadsheets.
  • Shall provide accessible conventional electronic document instruction, guidance, and support for campus community members to ensure all individuals, including those with disabilities, can effectively access and use these materials.
  • Should encourage faculty, staff, and students to use accessible formats when creating and sharing electronic documents, ensuring that all content is usable and inclusive.
  • Should collaborate with the Accessibility Coordinator and Technology Services to address any issues related to the accessibility of conventional electronic documents and make improvements where necessary.

Departments and/or programs shall purchase and produce only accessible multimedia and shall update existing inaccessible media as it is put into use. Applications should meet college purchasing standards. All media resources used in college programs and activities must be accessible. This includes, but is not limited to, instructional, informational, marketing, and promotional media .

3.1 Responsibility

Technology Services/Community Relations:

  • Shall maintain and continue to provide instruction on media accessibility (such as captioning and audio-describing media and transcribing audio), as well as how to display captioned media in classrooms.
  • Shall incorporate accessibility information into faculty training on the use of audiovisual equipment.

eLearning:

  • Shall incorporate captioning and media accessibility information into training.
  • Shall coordinate campus-wide captioning and transcription solutions that:
  • Provide assistance with obtaining permission to caption and audio-describe.
  • Disseminate information to the college community about college protocols related to accessible electronic media, including a list of approved vendors to perform captioning.

Community Relations:

  • Shall produce communications and promotional materials including social media posts that are captioned, audio-described or transcribed.

Library:

  • Shall maintain a library of transcribed audio and captioned video resources available for faculty, staff, and student use.
  • Shall maintain a record of the commercial availability of copyrighted media resources.
  • Shall assist faculty in identifying materials that are captioned before purchase.

Departments, programs, instructors and employees:

  • Shall purchase only captioned versions of audiovisual media whenever possible.
  • Shall ensure that all other media used on the web or in instruction is captioned.
  • Shall purchase only transcribed audio and audio-described versions of audiovisual media whenever possible.
  • Shall update any non-transcribed audio and any non-captioned/non-described video that is currently in use.
  • Shall use only transcribed audio and closed-captioned media with audio descriptions that are made available in a timely manner to the class.
  • Shall only assign such media as course material, whether optional or required.
  • All videos (professionally or internally produced) used in courses and shared on campus websites or video storage sites (such as YouTube and Vimeo) shall be captioned.
  • Students and employees may request that recordings of course sessions and presentations created for and during a course, and used only during that course, be captioned.
  • Shall assess the availability of audio descriptions and create a plan for meeting audio description standards for use on campus.
  • Audio description videos shall be acquired and created when technology permits.

Web pages, websites, and web-based software published, hosted, or used (including remotely hosted sites and software) by the college shall meet the guidelines and success criteria outlined in the Level AA, published by the W3C. All pages shall meet WCAG 2.1 AA success criteria with limited exceptions as outlined in Title II, 35.201 of the Americans with Disabilities Act and Washington State USER-01 Policy.

Regardless of exceptions, the college shall provide individuals with disabilities effective communication, reasonable modifications, and an equal opportunity to participate in or benefit from college services, programs, and activities.

4.1 Responsibility

Community Relations:

  • Shall ensure that any Content Management System (CMS) and other web production or web object creation software proposed and supported by Technology Services shall be accessible and shall produce accessible web pages.
  • Shall coordinate instruction and support for campus community members supplying and creating content for college websites to ensure that individuals who author web content shall do so in accordance with WCAG 2.1 Level AA Guidelines.
  • Shall review updates and new content created by designated content editors prior to publishing for accessibility compliance.
  • Shall compile and maintain data to track compliance with the policy and procedures and make recommendations for addressing any issues.
  • Webpages published or hosted by the college on or after April 24, 2026 shall aim to be accessible according to WCAG 2.1 Level AA standards. Upon a specific request for access by an individual with a disability, the college shall update non-accessible pages to comply with the WCAG 2.1 Level AA standard or otherwise make the content available to the individual in a timely manner.
  • Where it is not possible to make a web page directly accessible due to technical or legal limitations, the college shall provide a conforming alternate version that provides equivalent access.

Departments and programs:

  • Shall comply with web accessibility standards when creating web content, websites, and programs.
  • Shall ensure that online activities are hosted in accessible environments and that online content adheres to the standards outlined in this procedure.
  • The college shall identify a strategy to ensure that webpages providing essential student functions are accessible.
  • College program and department websites shall link to the college’s main accessibility page, which includes a statement of commitment to web accessibility and provides a method for reporting barriers and/or requesting an alternative format that ensures equivalent access.

Software, hardware, and systems purchased or implemented by the college shall be accessible and shall produce accessible products. In this context, "accessible" means either directly or by supporting the use of assistive technology.
Examples of software, hardware, and systems include, but are not limited to:

  • Learning and content management systems
  • Library and email systems
  • Administrative management systems such as finance, registration, and human resources
  • All software, hardware, and software services used for student services. This applies to all types of software, including freeware, shareware, desktop, enterprise, subscription, and remotely hosted options.
  • Software accessed through a web browser shall comply with the web accessibility standards outlined in Section 4 of these procedures.
    Examples of technology that shall not be considered accessible include:
  • Videos without closed captioning
  • Web applications that cannot be read by screen readers
  • Computer kiosks that are inaccessible to individuals using wheelchairs

5.1 Responsibility

Suppliers and vendors shall demonstrate that all IT products and services provided to the college conform to the Web Content Accessibility Guidelines (WCAG) 2.1 Level AA standards, as defined by the World Wide Web Consortium (W3C).
Acceptable documentation of conformance includes one of the following:

  • An independent, third-party Accessibility Conformance Report (ACR) prepared by a qualified accessibility consultancy, or
  • A completed Voluntary Product Accessibility Template (VPAT) using the VPAT 2.5 format, which is based on WCAG 2.1 Level AA standards.
    The college shall validate accessibility documentation submitted by vendors or suppliers to ensure that the product or service meets applicable accessibility requirements under federal and state laws and policies.

Accessibility Coordinator:

  • Shall review all submitted Voluntary Product Accessibility Templates (VPATs) and Accessibility Conformance Reports (ACRs) for currency, completeness, accuracy, and conformance with WCAG 2.1 Level AA success criteria.
  • Shall request additional documentation or clarification from vendors as needed to ensure a comprehensive understanding of the accessibility of the product or service.
  • Shall consult with qualified third-party evaluators who have assessed the product or service for accessibility, or conduct an internal evaluation when appropriate.
  • Shall require and assess a written remediation plan from the vendor for any identified accessibility deficiencies, including timelines for correction, and shall advise on contractual language to ensure enforceability of remediation obligations.

Technology Services:

  • Shall ensure that assistive technologies are readily available to students using campus computer labs and other publicly accessible computing environments.
  • Shall ensure that assistive technologies are provided in a timely manner to campus employees, including student employees, upon request or as required for access.
  • Shall ensure that all internally developed applications (web, desktop, mobile, or other platforms) conform to the WCAG 2.1 Level AA, WAI-ARIA 2.0, and ATAG 2.0 standards, extrapolated as necessary for non-web-based technologies.
  • Shall prioritize the evaluation of electronic and information technology (EIT) used by current students, prospective students, and the general public, and shall notify the Accessibility Coordinator of any technology requests submitted by departments or employees—whether free, grant-funded, purchased via PCARD, or acquired through ctcLink—to facilitate an accurate and thorough accessibility evaluation.

Departments and programs/college employees:

  • Shall complete a Service Agreement / Software Request Form to notify Technology Services of any intent to purchase, subscribe to, or implement technology solutions.
  • Shall aim to ensure that all purchased or locally managed software, hardware, interfaces, modifications, and electronic systems are accessible to individuals with disabilities.
  • Shall proceed with the purchase of electronic and information technologies (EITs) only if they are accessible, except where doing so would impose a fundamental alteration of a program or activity or result in an undue financial or administrative burden. In such cases, the department shall work with the Accessibility Coordinator to provide an accessible alternative.
  • Shall work with the Accessibility Coordinator and Technology Services to develop a proactive review strategy for academic and operational hardware, with the goal that only hardware with accessible options—such as accessible door access systems and educational technology—are selected for campus-wide deployment or instructional use.
  • Accessibility Coordinator & Campus Accessibility Work Group:
    Shall coordinate campus-wide processes to ensure the accessibility of software, hardware, and electronic systems procured or developed by the college.
  • Shall convene regular meetings to assess progress, review compliance data, and address emerging accessibility concerns.
  • Shall compile, analyze, and maintain records to track compliance with accessibility procedures and recommend strategies for resolving identified gaps.
  • Shall develop and maintain a college-wide strategy to ensure the ongoing accessibility of learning management systems, instructional technologies, and course materials.
  • Shall oversee and support the implementation of a program to provide education, training, and resources related to the accessible use of classroom technology, including but not limited to student response systems, podium interfaces, blogs, and educational software.
  • Shall ensure that campus computer labs meet EITA-recommended configurations and procedures, as outlined by Technology Services.
  • Shall include representatives from the following areas to ensure a cross-functional approach to accessibility compliance:
  • Accessibility Coordinator
  • Director of Technology Services (CIO)
  • Director of Community Relations (PIO)
  • eLearning Coordinator or Instructional Designer
  • Web Content Coordinator
  • Public Records Officer
  • Office of Institutional Effectiveness
  • Procurement
  • Library and Media Services
  • Instruction Services and Faculty
  • Student Services and Disability Support Services

Accessible
“Accessible” means that individuals with disabilities are able to independently acquire the same information, engage in the same interactions, and benefit from the same services as individuals without disabilities, within the same timeframe and with substantially equivalent ease of use.

Alternative Format
“Alternative format” refers to a format that presents information in a manner that allows equal access for individuals with disabilities. Examples include braille, large print, audio recordings, and accessible digital text.

Assistive Technology (AT)
“Assistive technology” refers to software or hardware used by individuals with disabilities to access electronic content or perform functions that might otherwise be difficult or impossible. Examples include screen readers, magnification software, speech recognition software, and alternative input devices.

Captioning
“Captioning” refers to the textual representation of spoken words and sounds displayed on a video or multimedia presentation to ensure access for individuals who are deaf or hard of hearing. Captions may be closed (toggle on/off) or open (always displayed).

Disability
“Disability” refers to an actual, perceived, or non-apparent physical, sensory, mental, or cognitive condition that substantially limits one or more major life activities.

Electronic and Information Technology (EIT)
“Electronic and Information Technology” or “EIT” refers to information technology and any equipment, system, or subsystem used in the creation, conversion, storage, duplication, transmission, or display of data or information. This includes, but is not limited to:

  • Internet and intranet websites
  • Digital content and electronic publications (e.g., e-books and e-readers)
  • Learning management systems
  • Multimedia and classroom technologies (e.g., personal response systems or "clickers")
  • Search engines and databases
  • Administrative systems such as human resources, finance, and registration
  • Office equipment such as classroom podiums, copiers, and fax machines
  • Telecommunications devices (e.g., telephones)
  • Information kiosks and Automated Teller Machines (ATMs)
  • Computers, software, firmware, ancillary equipment, support services, and related resources

Equivalent Access
“Equivalent access” means that any instance of non-conformance with WCAG 2.1 Level AA standards must not prevent individuals with disabilities from using electronic and information technology in a way that ensures substantially equivalent:

  • Timeliness — Information is available at the same time as for users without disabilities
  • Privacy — Personal information is protected equally
  • Independence — No unnecessary assistance is required to use the technology
  • Ease of Use — Access requires no greater effort than for those without disabilities

Equivalent access must allow individuals with disabilities to:

  1. Access the same information
  2. Engage in the same interactions
  3. Conduct the same transactions
  4. Participate in or benefit from the same services, programs, and activities

Hardware

Hardware refers to physical devices and components that are specifically designed, modified, or configured to assist individuals with disabilities in interacting with and utilizing digital systems or environments. This includes input and output devices, adaptive technologies, and environmental controls that enable users with sensory, physical, or cognitive impairments to access, navigate, and engage with technology effectively.

Remediation Plan
“Remediation plan” refers to a documented strategy developed by a vendor or internal party to bring an inaccessible technology product or content into compliance with accessibility standards, including clear deadlines and deliverables.

Student Response Systems

Student response systems (SRSs), also known as classroom response systems, audience response systems, or clickers, are interactive technologies that allow instructors to gather student responses to questions or polls in real-time.

Section 508
“Section 508” refers to the federal law (29 U.S.C. § 794d) requiring that all federal agencies’ EIT be accessible to people with disabilities, and serves as a baseline accessibility benchmark adopted by many states, including Washington.

Voluntary Product Accessibility Template (VPAT)
“VPAT” is a standardized form used by vendors to describe how their product conforms to accessibility standards, including WCAG, Section 508, and EN 301 549. VPAT 2.5 is the latest version aligned to WCAG 2.1 Level AA.

WAI-ARIA (Web Accessibility Initiative – Accessible Rich Internet Applications)
“WAI-ARIA” is a technical specification from the W3C used to improve the accessibility of dynamic content and user interface components developed with JavaScript and similar technologies.

WCAG (Web Content Accessibility Guidelines)
“WCAG” is a set of international guidelines developed by the World Wide Web Consortium (W3C) to make web content more accessible to people with disabilities. WCAG 2.1 Level AA is the standard referenced in most U.S. laws and policies.

Web Accessibility
“Web accessibility” means that websites, tools, and technologies are designed and developed so that people with disabilities can use them. More specifically, people can perceive, understand, navigate, and interact with the web and contribute to it.

  • Americans with Disabilities Act of 1990 (ADA), and the
  • Washington State Core Services RCW 28B.10.910-916,
  • Washington State Policy USER-01 –

 


Revision Log

Date  By  Notes 
5/6/2025 B. Mugleston New Procedure
  1/09/2018   S. Towsley  Version 1.0

Procedure Contact:  Director of Technology Services


6.14 - Mobile Device Management

Approved by the Administrative Council on May 6, 2025


Purpose

The purpose of this procedure is to establish guidelines for the acquisition, use, and reimbursement of mobile communication including cellular devices,technology,telephones, equipment, and services. It aims to ensure proper management and compliance with Yakima Valley College (YVC) policies regarding the use of college owned mobile devices including cellular phones for official college-related activities.

In certain circumstances, cellular technology is the most effective means of conducting college business, especially for individuals who must remain on call. Use of cellular telephones for college business is permitted under the following guidelines, in accordance with the college’s procedures:

  • Cost-Effectiveness: Cellular telephones should only be used when no safer, more cost-effective alternative is available.
  • Prohibited Personal Use: College-owned cellular phones for official state use may not be used for personal calls (RCW 42.52.160).
  • Monitoring: Cellular phone conversations are not private and may be subject to monitoring. Users should exercise caution when discussing sensitive information.

The State Auditor’s Office (SAO) mandates minimizing liability and risk associated with cellular phone use. As such, not all college employees are eligible for cell phone reimbursement. Generally, the college will not purchase cellular telephones. If a purchase is required, it must receive written approval from the college president.

The use of state equipment is restricted by law and regulation to official state business, on and off campus (RCW 43.19.1917). RCW 42.20.010 provides that any public officer using any person or property under their control for personal benefit at any time or place is guilty of a gross misdemeanor.

Request for Mobile Device Allocation and Utilization:

Employees who require cellular service for college business must submit written request to their respective supervisor, dean/director, and vice president. If approved by those individuals the written request should be submitted to the president.  The president will review the request to ensure the employee meets the criteria for cell phone usage. Approved requests will be forwarded to the Director of Business and Accounting Services for processing.


Revision Log

Date By Notes
5/6/2025 B. Mugleston New Procedure. 

Procedure Contact:  Director of Technology Services


6.15 - Technology Master Plan and Planning Processes

Approved by Administrative Council on April 22, 2025


Executive Summary

The college’s Technology Master Plan & Planning Process (TMPPP) outlines how technology supports this mission by advancing institutional goals, ensuring infrastructure sustainability, and integrating policies and governance that align with state standards and evolving cybersecurity needs.

Recent strategic planning has modernized 鶹Ƶ’s (YVC) technology. Significant upgrades have been made to the network, hardware/software, enhancing reliability, flexibility, and operational resilience. 

YVC Technology Services (TS) advances the college’s mission, listed below, by delivering reliable, forward-looking technological solutions that support instruction, student success, and institutional effectiveness.

As a federally designated Hispanic-serving Institution residing on the traditional homelands of the 14 Confederated Tribes and Bands of the Yakama Nation, Yakima Valley College cultivates equity and a culture of innovative and inclusive teaching and learning.

鶹Ƶ serves all students holistically, supports all students’ learning goals, and fosters achievement within career and educational pathways. We strengthen our communities by providing opportunities for personal enrichment, economic mobility, and sociocultural engagement.

鶹Ƶ’s Technology Master Plan & Planning Process (TMPPP) provides a strategic framework for identifying, integrating, and sustaining technology solutions that support the college’s mission and institutional objectives. As a living document, the TMPPP guides the management of technology assets.

Through the annual budget planning cycle, technology needs are assessed and documented using input from President, Vice-President’s, Deans and/or Directors, inventory reviews, system lifecycle evaluations, and security requirements. These needs are then evaluated by Technology Services to ensure alignment with security, accessibility, and integration standards. Proposed initiatives are reviewed by the appropriate administrative leadership for budget consideration and final approval, ensuring a coordinated and sustainable approach to advancing YVC’s technology environment.

Technology Services maintains Polices, Procedures, and Standard Operating procedures.  The Board of Trustees directs the college president and administration to develop and implement procedures and standards to ensure the integrity and security of all campus IT facilities, resources, and services managed by YVC.

鶹Ƶ IT policies and standards are foundation to institutional guidance, adhering to Washington Technology Solutions (WaTech) standards and overseen by the Technology Services Board (TSB). Policies and procedures require periodic updates to address evolving technology, legal requirements, and emerging security threats, ensuring governance and compliance.

Beginning in 2022, 鶹Ƶ has made strategic improvements towards modernizing its technology systems to better support students, faculty, and staff. The following highlights showcase YVC’s progress and ongoing commitment to innovation, resilience, and academic excellence. Each initiative strengthens YVC’s technology infrastructure and enhances the campus community’s access to reliable, secure, and inclusive technology. 

1. State of YVC’s Technology Systems
On November 9, 2023, Technology Services presented the state of technology and requested updated technology to the Board of Trustees (BOT). This request was approved on January 11, 2024. Before January 2023, YVC’s Technology Services faced risks from an aging network, including security vulnerabilities, hardware failures, decreased productivity, higher maintenance costs, limited functionality, and inflexibility. In January 2023, Technology Services secured one-time funding to update its technology infrastructure, divided into three major sections: network devices (switches, access points, battery backups, servers/storage), hardware (phone system, classroom, meeting room, copiers, printers, computers, monitors), and software (SQL server and Intune). This funding helped mitigate risks associated with an aging network.

Network
The network administrators are currently working on updating an archaic phone system.  They have also begun updating battery backups and switches.

As part of the infrastructure modernization, significant upgrades were made to YVC’s network backbone to improve performance, reliability, and security. Technology Services replaced aging switches, access points, and battery backup systems across campus, enabling faster connectivity and more stable wireless access. 

These upgrades addressed previous concerns about network instability and provided a scalable foundation to support future growth and a more secure network.

System Administration
The system administrators recently installed new production, disaster recovery, and virtual desktop systems. New servers and storage solutions were also deployed to support modern applications, improve data access speeds, and enhance business continuity.

To strengthen operational resilience and user flexibility, YVC’s system administrators implemented key upgrades to disaster recovery and virtualization platforms. A refreshed backup and disaster recovery strategy now ensures quicker restoration of services and minimizes data loss in the event of a system failure or cyber incident. In parallel, the deployment of a Virtual Desktop Infrastructure (VDI) provides secure, remote access to campus computing resources, allowing faculty, staff, and students to access critical applications from virtually any location. These enhancements not only support continuity of operations but also align with best practices in cybersecurity, accessibility, and academic flexibility.

Applications
There are many behind the scenes processes that assist the college information systems in running smoothly.  These processes may do anything from manage data from SBCTC/ctcLink or automate student and staff computer account lifecycle.  

Technology Services developers have created multiple applications, including Roleout, IDVerify, myAD, myID, Trac-it, and Register. These tools assist both staff and students in various ways. Roleout, IDVerify, and myAD assist staff with assigning and managing user roles. Meanwhile, Register, myID, and Trac-it securely facilitates email generation, ID cards, and track campus resource usage. 

2. Cybersecurity
Cybersecurity has made significant progress in recent years. On May 18, 2023, YVC assisted in hosting a tabletop cybersecurity event. On June 13, 2023, YVC launched Multifactor Authentication (MFA) for both staff and students across Microsoft and ctcLink applications. On April 16, 2024, a new Information Security Officer (ISO) was appointed at YVC. Additionally, student Microsoft/Canvas password enhancements were implemented on August 19, 2024. 

As part of YVC’s commitment to continuous improvement, the college consistently evaluates and seeks new strategies and technologies to enhance its cybersecurity posture. This includes ongoing reviews of security policies, proactive monitoring, and collaboration with industry partners to identify emerging threats and best practices.

3. Technology & Classroom Support
Tech Services help desk staff received funding from both Universal Design for Equity and Accountability in Learning (UDEAL) and the State of YVC’s Technology Systems funding from January 2023. This team has implemented 1600 windows 11 upgrades, 179 desktops, 126 monitors, 88 laptops, 35 copiers, 20 projectors, 5 Wacom, 3 large displays, to name a few.

4. ctcLink
Deployment Group 6 ctcLink project is a $145 million, decade-long project to move from Legacy to a modern platform on a shared system for the 34 SBCTC schools. In May of 2022, YVC joined the ctcLink family.


Revision Log

Date By Notes
 4/22/2025 B. Mugleston  New Procedure. 

Procedure Contact:  Director of Technology Services

Questions? Contact Us.

Megan Jensen
Records Management Coordinator
MeganJensen@yvcc.edu