archive-edu.com » EDU » H » HAWAII.EDU

Total: 1378

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Graphics Standards for the 10 campuses of the University of Hawaii System
    email ur hawaii edu Official UH Seal and Signatures The official signatures and seal variations for each campus and the UH System office are available below Please note the terms of use and that you will have to log in with your UH User ID to download the zip file for your campus If you have problems or need to use extra large versions of the images contact EAUR Conditions for use By downloading the UH seal and signatures the user agrees to comply with applicable federal and state laws Hawai i ethics code and university licensing regulations and graphics standards Images are provided for official university use only and require log in with UH faculty staff username and password Retailers and vendors should refer to the Collegiate licensing website or contact the UH licensing administrator Seal and Signature Downloads UH Mānoa 4 MB zip file UH Hilo 4 2 MB zip file UH West O ahu 4 2 MB zip file Hawai i Community College 6 6 MB zip file Honolulu Community College 3 4 MB zip file Kapi olani Community College 3 5 MB zip file Kaua i Community College 3 3 MB zip file Leeward Community College

    Original URL path: http://hawaii.edu/offices/eaur/graphicsdl.php (2016-02-15)
    Open archived version from archive

  • UH Systemwide Policies and Procedures Information Systems - Executive Policies
    leave of absence when called to active duty or during periods of camps of instruction or field maneuvers under the call of the President of the United States or the Governor of the State as prescribed by applicable collective bargaining agreements and law namely the Uniformed Services Employment and Reemployment Rights Act USERRA of 1994 Title 38 of the United States Code and the Hawai i Revised Statutes Chapters 78 16 5 and 78 16 6 II Definitions No policy specific or unique definitions apply III Executive Policy A Military Leave With Pay 1 An employee whose appointment is for six 6 months or more shall while on active duty or during periods of camps of instruction or field maneuvers as a member of the Hawai i national guard air national guard naval militia organized reserves including the officers reserve corps the enlisted reserve corps or the public health service commission corps under call of the President of the United States or the Governor of the State be placed on leave with pay status for a period not exceeding fifteen 15 working days in any calendar year except as provided in subparagraph A 2 2 If an employee is called to active duty or is required to report for camp training or field maneuvers by official military orders a second time within a calendar year the employee may elect to use up to fifteen 15 working days of the succeeding calendar year provided that the employee s entitlement to the working days advanced shall be canceled from the succeeding calendar year and the employee shall so agree in writing The employee who is advanced leave shall be required to reimburse the University an amount equivalent to the days advanced in the event the employee leaves government employment prior to the completion of a year s service in the succeeding year from which leave was advanced except in the case of death of the employee B Military Leave Without Pay 1 When requested permanent and probationary employees who are eligible for reemployment rights pursuant to USERRA and whose appointments are expected to continue indefinitely or for a significant period of time are entitled to military leave without pay when called to perform active military service Employees with brief non recurrent appointments or appointments which are unlikely to continue indefinitely or for a significant period of time generally one year or less in duration such as 89 day hires casual hires etc and graduate assistants are not eligible 2 The duration of the military leave without pay shall be for not more than five 5 years provided the leave does not exceed the ending date of the employee s appointment period and subject to the exceptions provided by the USERRA 3 Upon conclusion of the military leave without pay eligible employees shall be entitled to reemployment rights in accordance with the USERRA C The employee shall be responsible for providing advance written or verbal notice to their supervisor for all military duty

    Original URL path: http://hawaii.edu/policy/?action=viewPolicy&policySection=ep&policyChapter=9&policyNumber=212&menuView=open (2016-02-15)
    Open archived version from archive

  • UH Systemwide Policies and Procedures Information Systems - Executive Policies
    Office Informational Updates Policy and Procedures Creation Maintenance and Abolishment Public Safety and Emergency Management Plans Frequently Asked Questions Login Viewing Policy EP 5 217 Title Reinstatement of Deployed Active Duty Military Hawaii National Guard and Reservists Header Executive Policy Chapter 5 Academic Affairs Executive Policy EP 5 217 Reinstatement of Deployed Active Duty Military Hawaii National Guard and Reservists Effective Date October 2014 Prior Dates Amended April 2007 est Responsible Office Office of the Executive Vice President for Academic Affairs Governing Board of Regents Policy RP 2 202 Duties of the President and RP 5 211 Admissions Review Date August 2018 I Purpose To establish and promulgate guidelines concerning the academic course of study for University of Hawaii students who are deployed due to their status as members of the active duty military and their authorized dependents the Hawaii National Guard or the military reserves and who subsequently return for matriculation to the University of Hawaii II Definitions No policy specific or unique definitions apply III Executive Policy A The University will reinstate students who were deployed to their original course of study on the UH campus they last attended They will have no loss of credit or privileges and will maintain registration priority consistent with their continuing student status when they return to their original campuses no more than one semester after they return from deployment as long as the program and courses still exist and remain viable B The Chancellors shall provide a report to the President each year by October 1 that lists the number of students assisted by the policy IV Delegation of Authority There is no policy specific delegation of authority V Contact Information Subject Matter Experts Jan Javinar javinar hawaii edu 956 8753 Office of the Associate Vice President for Student Affairs at

    Original URL path: http://hawaii.edu/policy/?action=viewPolicy&policySection=ep&policyChapter=5&policyNumber=217&menuView=closed (2016-02-15)
    Open archived version from archive

  • UH Systemwide Policies and Procedures Information Systems - Executive Policies
    Deployed Active Duty Military Hawaii National Guard and Reservists Executive Policy Chapter 6 Tuition and Fees Executive Policy EP 6 205 Reimbursement of Tuition and Fees of Deployed Active Duty Military Hawaii National Guard and Reservists Effective Date October 2014 Prior Dates Amended April 2007 est Responsible Office Office of the Vice President for Academic Affairs Governing Board of Regents Policy RP 2 202 Duties of the President RP 6 208 Board Exemptions to Non Resident Tuition and RP 6 210 Payment of Tuition Fees Charges Review Date August 2018 I Purpose To establish and promulgate guidelines concerning the tuition and fees for University of Hawaii students who are deployed due to their status as members of the active duty military and their authorized dependents the Hawaii National Guard or the military reserves II Definitions No policy specific or unique definitions apply III Executive Policy A Students who are U S military personnel on active duty and their authorized dependents who withdraw from any UH campus for reasons related to U S military deployments are to be provided a full refund of all tuition and mandatory fees B Students who are members of the Hawai i National Guard and not their dependents who are called to active duty and withdraw from any UH campus are to be provided a full refund of all tuition and mandatory fees C Students who are members of the U S military reserves and not their dependents who are called to active duty and withdraw from any UH campus are to be provided a full refund of all tuition and mandatory fees D Deployed students who paid fees for services such as residence halls child care and others shall receive a prorated refund as determined by each campus E The Chancellors shall provide a report

    Original URL path: http://hawaii.edu/policy/?action=viewPolicy&policySection=ep&policyChapter=6&policyNumber=205&menuView=closed (2016-02-15)
    Open archived version from archive

  • UH Systemwide Policies and Procedures Information Systems - Executive Policies
    B and under no circumstances may individuals use institutional technology resources for commercial purposes without prior written authorization This includes activities such as the use of University email or web sites for marketing a home business hosting a commercial home page or providing friends who are not members of the University community with access to institutional equipment and services Users may not run private servers or bulletin board systems for non University purposes through University networks or provide such connectivity to others Political campaigning may not be engaged in using the University s electronic information systems g Users may not engage in activities which compromise institutional systems or network performance for others The University administers its technology resources on a shared use basis for the benefit of the entire community This is only possible when all members of the community respect the need of others for services In addition portions of the Internet itself may be vulnerable to disruptions in service by malicious activities As a whole the Internet protects itself through an informal and evolving code of behavior among system administrators The University of Hawaii is committed to be a good institutional citizen of the Internet noting that non cooperating institutions are sometimes blacklisted from certain services which could prevent members of the University community from achieving their legitimate academic requirements As a general rule the University tries to be permissive rather than prohibitive in these matters but certain behaviors by individuals can compromise the availability and reliability of services for the entire community Examples of such activities include the unauthorized running of server programs on institutional systems or hosting non educational web sites intended to do nothing more than generate high hit counts Nothing in this section is intended to discourage faculty or staff from operating authorized servers in a responsible manner in support of the mission of the University While it attempts to manage resources on a content neutral basis the University does reserve the right to curtail specific uses of its technology infrastructure that unduly interfere with the institution s ability to provide the best possible service to the overall community Users may not engage in the transmission of unsolicited bulk email spamming regardless of how important it may seem to the sender Email is a form of individual communication not a public forum and should not be used to express opinions or forward views to those who have not expressed a wish to engage in the dialog This policy shall in no way limit the use of email as a legitimate means for the University community to share information and communication Under no circumstances may users create transmit or forward electronic chain letters Chain letters are often social notes wishes of good fortune or most insidiously bogus virus warnings which request the recipient to forward the message to friends and colleagues ad infinitum Such notes can have a significant and consequential impact on institutional resources as they are forwarded around University systems Users may not initiate or participate in the targeting of a particular person or system with mass quantities of email mail bombs In the paper world junk mailers bear the full costs of such activities when they choose to buy a stamp and envelope but with University email the costs are borne by the entire community and the taxpayers of the State Activities such as spam chain letters and mail bombs degrade performance of networks and systems may violate agreements with third parties such as the University s Internet Service Providers and may even endanger the availability of the email services for the entire institution Violations may be cause for the revocation of the offender s access to University resources D Confidentiality and Security of Electronic Information The University strives to maximize the confidentiality and security of its information systems and services within the limitations of available resources As with paper based systems no technology can be guaranteed to be 100 secure All users should be aware of this fact and should not have an expectation of total privacy regarding information that is created stored sent or received on any networked system The most important first line of defense in information security is the password and it is for that reason that the University username and password must be adamantly protected as described above And institutional custodians of private information should exercise prudence using secure technologies when appropriate and feasible The Internet environment offers tremendous opportunities to provide convenient access to University information and services to authorized individuals wherever they may be Users who serve as custodians of institutional information should be particularly aware of the potential for unauthorized access to or tampering with on line information and services in the Internet environment Techniques such as the use of encryption secure web servers or restricting access based on specific criteria may be appropriate based on the balance between access and security applicable to any specific application or service Technology administrators are responsible to provide reasonable measures of protection of the underlying technology systems and infrastructure they manage But risk assessment and risk management strategies are the responsibility of the functional custodians of specific information and services in consultation with technology managers who should describe the specific technical safeguards in place E Ownership and Disclosure of Information The University owns the computers and networks that comprise the institutional information technology infrastructure The electronic allocation of file space to a user does not assign legal ownership of the content Rather it is the granting of permission to use these institutional facilities subject to the policies and regulations of the University and applicable statutes Collective bargaining agreements and related University policies govern ownership of intellectual property Files stored on University systems may be subject to disclosure under the U S Freedom of Information Act or the Hawai i Uniform Information Practices Act In addition it is the policy of the University to cooperate with all legally empowered investigations initiated by law enforcement agencies when presented with a legitimate court order such as a warrant or subpoena As has been made abundantly clear in highly publicized legal cases this may include archives of electronic mail sent or received In addition the contents of files on University systems may be inspected in the context of a duly authorized University investigation Users should be aware that most institutional systems are backed up on a routine basis to ensure the ability to recover from computer or network failures or disturbances Backup procedures are generally not designed or intended for long term storage of files However all users should be aware that files or email messages that they have deleted may still persist on backups and may therefore be subject to disclosure in a duly authorized investigation F Privacy of Student Information University computing information and network resources must be used in a manner consistent with appropriate rules and laws governing the individual privacy of students This includes the Family Educational Rights and Privacy Act FERPA codified in 20 U S C section 1231g as amended Hawai i Revised Statutes Chapter 708 891 892 and 893 Chapter 20 20 Hawai i Administrative Rules entitled Protection of Educational Rights and Privacy of Students and UH Administrative Procedure A7 022 G Commitment to Access The University of Hawai i is firmly committed to compliance with the Americans with Disabilities Act of 1990 ADA which prohibits discrimination on the basis of disability in employment or in the provision of educational services Technology may be either a barrier or a tool for compliance depending on how it is used All units of the University are responsible for ensuring that services they provide via technology be accessible just as for their on campus programs and services If unsure of their obligations administrators are advised to consult with their Equal Employment Opportunity officer for guidance on compliance with the ADA or other related mandates H Special Responsibilities of System and Network Administrators Administrators of information technology bear a heavy responsibility to maximize the availability and utility of the systems they manage while at the same time honoring individual users justifiable expectations of an information and communications environment that is safe for its users In addition to having all the responsibilities of any other user as described above system administrators are granted certain system privileges which make it possible for them to manage the technical resources under their control System privileges may permit access to initial passwords files voice mail telephone or electronic communication and information about individual usage patterns These privileges are necessary for doing their jobs but have tremendous potential for abuse as well Such abuse is a violation of University policy and this section outlines the unique responsibilities and obligations of system and network administrators These special responsibilities accompany the granting of any network or system privileges to any member of the University community whether faculty student or staff System administrators to whom this applies include individuals who administer departmental college or institutional servers individuals who administer network devices such as modems and routers individuals responsible for telephone services and individuals who have any level of privileged access to institutional information systems Under no circumstances will abuse of system privileges be tolerated and violations will be considered as legitimate cause for disciplinary action up to and including termination and or legal prosecution Individuals who are not willing to accept these responsibilities should not be in positions which require system privileges in order to perform their duties In addition individual systems and servers can be carelessly mismanaged not only to the detriment of the users of that system or service but to the detriment of the entire institution Before making the decision to install a server the responsible administrator should be prepared to commit the time and resources necessary to ensure proper management This includes designation of a professional system administrator who will have the time and expertise to understand the technical implications of their systems maintain current on vulnerabilities software patches and new releases and be able to address urgent issues on an immediate basis Failure to do so may endanger not only the integrity of services provided to one s own users but to the institution as a whole The University will not hesitate to disconnect improperly managed systems that endanger the integrity of institutional networks systems or services and it will be the sole responsibility of the unit s system administrator or its management to remedy the situation While the following list is not considered to be all inclusive it establishes the framework for unacceptable behaviors University management has the responsibility to ensure that system administrators within their units address these matters and should not permit the establishment of servers and services within their units unless they understand the potential for abuse and accept responsibility for compliance And users should be welcomed to discuss any or all of these matters with their system administrators All perceived violations of these guidelines should be reported to the appropriate dean director provost or vice president 1 System administrators shall protect individual passwords Users have the right to expect that their passwords be treated with complete confidentiality Passwords should never be divulged to a third party except as necessary in the course of distributing a new password to a user System administrators should take the utmost care in how passwords are distributed striving for the best possible balance between a user s needs for privacy and convenience Any time a password is transmitted to a user the user should be advised to change their password immediately to protect against any possible disclosure during the transmission 2 System administrators shall not browse inspect or copy users information System administrators may not browse the contents of user files or messages whether on line or from backups without the user s permission Inspection of information is permitted only upon specific authorization from a dean director provost vice president or legal authorities as part of a duly authorized investigation or for official University business As a matter of professionalism system administrators should avoid direct or indirect contact with users information and communication content whenever possible In spite of their best efforts system administrators may from time to time encounter confidential information in the performance of their duties Under no circumstances should such information be acted upon divulged or used for the personal benefit or profit of anyone Violations of this trust endanger the viability of the institutional information infrastructure and will not be permitted However system administrators may perform routine scans and are encouraged to utilize standard security tools to check for potentially damaging or illegal software on institutional systems 3 System and network administrators shall not routinely collect information on individuals information usage patterns The University expects that the members of its community will access a rich variety of information and communication resources in the course of their academic activities System administrators shall not monitor or collect data regarding the activities of individuals unless specifically authorized to do in the context of a duly authorized investigation This is not intended to interfere with the responsibility of system administrators to collect and analyze general anonymous information about the overall patterns of usage of information technology resources Such information is a vital tool in ensuring the adequacy of the institutional technology environment to meet the needs of its users Nor are system administrators obliged to spend undue efforts disabling the routine logging activities that are built into many server operating systems 4 System administrators shall configure software systems so as to maximize the confidentiality of user communication Administrators of email servers in particular bear a responsibility to respect the privacy of their users communication Email systems should be configured so as to maximize privacy For example email that is rejected for technical reasons should be returned to the sender rather than to the postmaster And routine error notification messages to the postmaster should contain only message headers not the message contents Users are encouraged to ask their email administrator how email systems are configured and under what circumstance their email may be disclosed 5 System administrators shall configure systems to enforce appropriate password policies Most server operating systems have configurable options for password security UH system administrators should use these options to comply with the UH password policy in Appendix C In addition system administrators should ensure that all activities relating to security changes are handled in accord with a written policy and are documented E g system privileges should not be given to individuals who do not need them to perform their job and the granting of such privileges should be documented Procedures should be in place for emergency access to critical passwords needed in case of system failure when the usual system administrator s may not be available The level of formality and detail of the security policy and practices may be dependent on the role and importance of specific systems and services 6 System administrators shall stay abreast of any vulnerabilities of their systems and manage security in accord with appropriate recommendations System administrators are responsible for remaining up to date at all times with security issues relevant to the systems they administer This may be done through means such as their vendors information channels or Computer Emergency Response Team CERT bulletins System administrators are required to use this information to apply all recommended security patches in a timely manner 7 System administrators should configure their systems to minimize the chance for abuse and act promptly to end abuses upon notification Certain kinds of disruptions rely on the naiveté of system administrators on the Internet Any perception that the University of Hawai i is a haven for such abusers endangers the ability of the University community to communicate with others For example external sites that have been attacked by someone using a University of Hawai i system as the instrument of the attack may find that they can only safeguard themselves by blocking all traffic from the University of Hawai i As just two examples of the kinds of measures that should be taken email administrators should block anonymous email relays through their systems and network administrators should block the forging of IP source addresses from within networks they manage As noted above the University will not hesitate to disconnect improperly managed systems that endanger the integrity of institutional networks systems or services and it will be the sole responsibility of the unit s system administrator or its management to remedy the situation 8 System administrators shall publicize backup policy As noted above backups present a means by which information may be recovered that users believe to have been deleted Backup policies determine the persistence of deleted information and therefore users have a right to know the backup policy of all systems they use System administrators should post this policy or make it easily available to their users upon request I Due Process All alleged violations of this policy shall be processed according to the principles of due process for example allegations should always be investigated by a party other than the accuser It is the policy of the University to avoid creating unnecessary enforcement mechanisms for technology that are different than for other media Therefore the authority that would be responsible for comparable infractions shall also be responsible for enforcing violations that take place via technology E g if sexual harassment occurs via technology responsibility for enforcement shall reside with the same authority that would handle any other sexual harassment allegation In general when an alleged violation of this policy by a user is encountered the responsible staff or system administrator shall first notify the user The user will be expected to take immediate remedial action or respond by indicating that they do not believe they have violated the policy Depending on the seriousness of the alleged violation or should the violation persist after notification to the user further investigation and consequent enforcement action may be initiated Allegations

    Original URL path: http://hawaii.edu/policy/?action=viewPolicy&policySection=ep&policyChapter=2&policyNumber=210 (2016-02-15)
    Open archived version from archive

  • Emergency Information - University of Hawaii - Swine Flu
    your dorm room and away from others while sick can prevent them from getting sick too Ask a roommate or friend to check up on you and to bring you food and supplies if needed If you live in campus residence halls contact the staff in student housing to make arrangements for alternative housing and dining if necessary Recommendations from the Center for Disease Control You may have the flu if you have some or all of these symptoms fever chills cough sore throat runny nose body aches headache fatigue Some people experience diarrhea and vomiting If you are sick with the flu Stay home or in your place of dorm for at least 24 hours after there is no longer a fever or signs of a fever chills flushed appearance warmth sweating Stay in a separate room and avoid contact with others to prevent spreading the flu virus Drink plenty of clear fluids to avoid becoming dehydrated Contact a healthcare provider if you are at higher risk pregnant women people with chronic medical conditions young children and the elderly Contact a healthcare provider right away if you are having difficulty breathing or are getting worse Download UH s Avoid the Flu tips flyer 444KB PDF UH Campus Health Centers Check with your campus clinic or personal physician for vaccine availability University Health Services Mānoa UH Hilo Student Medical Services Kapi olani Community College Campus Health Services Kaua i Community College Wellness Center 808 245 8307 Leeward Community College Student Health Center Maui Community College Health Center Additional campus contact information Official Information and Services Call the state Department of Health information line 866 767 5044 7 a m 7 p m weekdays and 9 a m 5 30 p m on weekends recorded messages available around the clock Visit

    Original URL path: http://hawaii.edu/emergency/swine-flu.php?pv=text (2016-02-15)
    Open archived version from archive

  • Office of Procurement and Real Property Management, University of Hawai'i System
    p m and phone numbers are 808 956 8687 and 808 956 2093 fax The Office of Procurement and Real Property Management OPRPM located on the Manoa Campus is responsible for the systemwide administration of policies and procedures for the acquisition of goods services and construction and the processing of transactions involving real property With respect to procurement purchases under 2 500 are generally made by soliciting informal quotations while purchases between 2 500 to 100 000 to 250 000 for construction with certain exceptions are made by soliciting quotations through the use of SuperQUOTE an electronic on line Request for Quotation system Information regarding this system is available at www commercepoint com Purchases may also be made through solicitations in the form of Invitations for Bids IFB or Requests for Proposals RFP except in those situations where procurement exemptions sole source professional services or emergency circumstances apply Vendors interested in responding to an IFB or RFP may pick up copies of these documents at OPRPM Departmental fiscal officers serving the ten campuses within the University of Hawaii system have been delegated purchasing authority not exceeding 25 000 and may issue purchase orders and enter into contracts within their authority

    Original URL path: http://hawaii.edu/oprpm/ (2016-02-15)
    Open archived version from archive

  • Office of Risk Management, University of Hawai'i System
    please utilize the procedures and forms on our website 2015 Annual Security Fire Safety Report The 2015 Annual Security and Fire Safety compliance document is available for viewing on the UH Manoa Department of Public Safety website at http manoa hawaii edu dps PDFs annual report15 pdf The website and report contain information regarding campus security and personal safety including such topics as crime prevention fire safety crime reporting policies disciplinary procedures and other matters of importance related to security and safety on campus REMINDERS County Facility Use Permits If you are planning to utilize a County facility Honolulu Maui Kauai Hawaii please click here UH Property Report any newly acquired buildings within 30 days of acquisition Report any newly acquired large equipment purchases such as photovoltaic systems within 30 days of acquisition Report buildings that are sold or transferred to another department Report property losses timely Failure to report may result in denial UH Autos Report newly acquired vehicles within 30 days Report when vehicles are disposed of or transferred Determine if comprehensive collision or fire theft coverage is needed if required report immediately for coverage If a vehicle has not been reported to us prior to a loss or accident there will not be any coverage for damages to that vehicle Report all damage and accidents to your supervisor and submit applicable forms to the Office of Risk Management within five business days Engage in safe driving practices buckle up be aware of your surroundings and drive defensively Crime Report any crime loss IMMEDIATELY failure to do so will result in denial of claim Contact us if you have any questions regarding reporting procedures ABOUT US Risk management involves the identification evaluation and treatment of risks inherent in the operations of an organization At the University of Hawai

    Original URL path: http://hawaii.edu/riskmanagement/ (2016-02-15)
    Open archived version from archive



  •