VI - 15.14 - Policy on Using FRS Query
I. Policy and Purpose
Bowie State University (BSU) utilizes information technology to facilitate internal administrative operations involving financial accounting data. FRS Query and related modules are front-end applications which extract financial data from the primary transactional system and allow users to query the data. Query results can be viewed online or printed.
This policy is designed to ensure responsible and ethical behavior of FRS Query users in order to establish and preserve the integrity of application system data files, of which FRS Query provides read-only access to authorized users.
This policy covers authorized access to Bowie State University's computerized financial resources through the use of FRS Query.
This policy applies to all faculty and staff at Bowie State University that have been granted access to computerized financial resources on the BSU Campus-Wide Area Network via University-owned computers (PCs).
These PCs operate within the Campus-Wide Area Network through which data files are downloaded and managed centrally on the appropriate servers and/or distributed locally on authorized computers.
The Department Chairs, School Deans, Division Heads, Vice Presidents, and the Provost, with guidance from the Director of the Office of Information Technology and the Internal Auditor and legal advice from the Office of EEO Programs/Legal Counsel, will ensure compliance with this policy.
III. Guidelines and Standards
A. Network Access Security
The Director of the Office of Information Technology will grant network access privileges to directories/subdirectories that are required in connection with FRS Query to those authorized to receive network access privileges in addition to such other positions as are requested by an area vice president.
B. User-Level Security
1. The Director of the Office of Information Technology will:
a) identify members of a group and grant permission to groups and users to regulate what they are allowed to access within FRS Query.
b) maintain group/user access rights, log-on ids and passwords and issue individual group/user accounts and passwords for accessing FRS Query.
c) control the assignment of passwords and change passwords periodically to retain confidentiality.
2. Users will be:
a) required to identify themselves and type the appropriate log-on id and password when accessing FRS Query.
b) advised that all user accounts and passwords must be kept confidential and secure.
C. Hardware Security
University-owned computers (PCs) which have been logged onto FRS Query should not be left unattended.
A. Data Consistency
1. Security and data constraints prevent users from adding and correcting information in FRS Query.
2. All data additions and corrections must be made in the existing legacy application system. Standalone "shadow systems" should not be maintained without authorization of the area Vice President and should be a last resort option.
B. Data Presentation
1. Various standard financial reports are available with the FRS Query system. They include:
a) Financial Reports by Account Number
b) Financial Reports by Program
c) Financial Reports by Division, School or Department
d) Financial Reports by Object Group
e) Financial Reports by Sub Code
f) Financial Reports by FRS Transactions
2. FRS Query prominently displays criteria set by users. When providing reports for use by others, FRS Query users are expected to identify their selected criteria by entering them in the report's sub-title.
V. Exceptions and Deviations
Revision Date: 05/05/1998