UAA IT Policies and Standards Definitions

Definitions

Applicant: party that will go through the identity proofing process in order to become a subscriber.

Artificial Intelligence (AI): The term 鈥淎I鈥 refers to computer systems that are capable of performing tasks traditionally associated with human intelligence, such as making predictions, interpreting speech and generating language, recognizing patterns, solving problems, and making decisions.

Authentication: the process or action of verifying the asserted identity of an entity.

Authenticator: a mechanism or authentication system used to authenticate (verify) that the entity in a transaction is the owner of the asserted digital identity.

CAB: Change Advisory Board. A board within the IT organziation that advises on the implmentation of change to the production technbology environment. This is an IT Service Management function inteded to avoid conflicts or failed change implmentations. 

Campus Internetwork.  The physical and logical infrastructure that carries voice, video and/or data within a campus location up to and including connections to external networks or providers.  A network includes switches, routers, firewalls, store and forward devices, software used to manage the network, and all cabling and connecting equipment up to but not including user equipment.

CMT: CIO Management Team. Comprised of the three university CIOs, the System Office CITO, and CISO.

Computer: Any user-owned and operated computer serving as either a user workstation or a server.  This includes all forms of personal computers (e.g., desktop, laptop, notebook) as well as server-class computers without exception.

Digital Identity: a digital representation of an entity鈥檚 real world identity.

Digital Credential: A coupling of an identifier and an authenticator. An example is a username (identifier) and an authenticator (passphrase). The identifier is used to associate the transaction with a digital identity and an authenticator is used to authenticate the subject of the transaction.

DNS: Domain Name System. A system that translates domain names into IP addresses.

Email account (Official): Account with e-mail address of the form <UAusername>@alaska.edu. 

Email Resources: Include all facilities, technologies, information resources, and computing and electronic communication devices, hardware, software, and services required to accomplished the processing, storage, transmission, and communication of electronic mail, whether individually controlled or shared, stand-alone, or networked.

Enterprise: Enterprise in the context of this policy means the entirety of the University of 麻豆无码版 business entity. An "Enterprise identifier" is one that is issued by University of 麻豆无码版 and/or used broadly across the entirety of University of 麻豆无码版.

Enterprise Authorizations: Authorizations that grant an enterprise digital identity access to university data and/or IT services provided by the university and/or containing university data.

Enterprise Digital Identities: a university created digital representation of a real-world entity or purely digital entity consisting of one or more collected or university generated and assigned data attributes that can be used to differentiate one entity from another.

Entity: In the context of this policy includes but is not limited to a person, system, robot, device, or organization.

External Network.  Creating within a UAA-operated facility a physically separated network which is connected to a commercial or non-commercial service provider that is not specifically a part of an approved University of 麻豆无码版 network.  For example, users who install commercial cable modem or DSL modem Internet access services within UAA-operated facilities are creating external networks under this procedure.

Generative AI (GenAI): Services or applications that use deep learning models to create new content, including audio, code, images, text, simulations, and videos in response to user prompts.

Generative AI Application(s): Software or services that rely on Generative AI models or services.

Generative AI Model(s): Computational approaches that learn patterns and structure of input training data and use this in combination with statistical methodologies to generate new data.

GPO: Group Policy Object. A group in Active Directory that can be used to apply policies to entities in the group.

Human-in-the-Loop (HITL) Verification: Engaging humans in AI use and development to provide feedback, correct errors, and validate outputs helps AI systems learn, improve, and adapt over time.

The IAM Function: the collective service offering of IAM services and capabilities across the entire university regardless of which unit is offering or operating the service or product.

Identification: the process of differentiating one entity from another.

Identity Proofing: The process by which an applicant verifies the subject's association with their real-world identity.

LMS Instructor of Record: The individual listed in UAOnline as the instructor for a course. Other individuals may be added as instructors, but only the instructor of record can enter final grades in UAOnline.

LMS User: Anyone with access to Blackboard, no matter what the role.

LMS Disable(d): Restricting access to a user account, course, or enrollment record without permanent deletion. All content associated with the record(s) will remain intact and will be accessible when the record is re-enabled.

LMS Delete(d): Removing and completely deleting a user account, course, or enrollment record. All associated content is permanently deleted and cannot be retrieved.

LMS Course Shell: A unique area where users can share content. Individual container/area. A template for either academic courses or development courses.

LMS Blackboard 0template. The default template for all course shells.

Network Extension.  Connection of a network device (e.g., hub, switch, router) to a campus internetwork for the purpose of providing connectivity to multiple computers or network attached peripherals.  Examples include wireless access hubs and switches used to support a laboratory environment within a single geographic facility.

Network Device.  Equipment that is used to create a network extension or a private network.

Non-repudiation: the assurance that someone cannot deny the validity of something such as a transaction in an IT system.

Personally Identifiable Information (PII): Any information that can be used to distinguish or trace an individual鈥檚 identity, either alone or when combined with other information that is linked or linkable to a specific individual.

Private Network.  Creation of a virtual local area network (VLAN) within a campus network for the purpose of specifically aggregating a defined set of campus network ports.  Private networks will only be created under extraordinary circumstances related to security of information resources.

Public Information: Data classified as Public as defined by Board of Regents R02.07.093 that can be freely shared with the public and posted on publicly viewable web pages.

RBAC: Role Based Access Control. An approach to managing authorizations that is based on the assignment of roles to entities.

Student Registration System. Banner database with UAOnline user interface for faculty and students.

Technology/ IT Resource: Any item such as a computer, tablet, smartphone, or similar device and associated peripherals owned by University of 麻豆无码版 or used to store university data, including those in research contracts or private activities associated with the university, and privately owned technology devices that are connected to the University of 麻豆无码版 network or used to store university data.

Subscriber: When an applicant successfully completes an identity proofing process, they become a subscriber.

UAA IT: refers to Information Technology Services personnel or other IT personnel directed by the Chief Information Officer or under the specific direction of a community campus director at a community campus in coordination with the Chief Information Officer. 

University IT Service: Any IT Service provided by the university for the university community.

User Equipment.  A user-owned and operated device which is directly connected to a campus internetwork.  User equipment includes but is not limited to computers, printers, network-attached peripherals and network devices used to extend network services to two or more user-owned devices from a single port of a campus internetwork.