Skip to main content



Access Management - Access management refers to the processes, technologies and policies for managing digital identities and controlling how identities can be used to access resources. This is based on the business rules defined by the authoritative sources and IAM (Identity Access Management) Governance Committees.

Account Manager - Individual identified by each department to grant, track and terminate electronic accounts.

Account Idle/Timeout - Account feature that automatically logs out an individual after a predetermined length of time of no activity.

Account Lockout - Account feature that automatically locks down an account from any access after a predetermined number of failed username/password login attempts.

Affiliate Account - A temporary account requiring access to University resources for a specific purpose and period of time greater than 15 days for an individual who may not be directly employed by WVU.

Authentication - A process to verify that someone is who they claim to be.

Authentication Credentials - Individualized username and password combinations or biometric security methods used to access restricted WVU data resources.

Authoritative SourceSource for user data, which is to be considered the sole authority for that type of data.

Authorization – Privileges and permissions granted to an individual by a designated official to access or use a system, program, process, or information.

Authorized Person –  Person who needs to access sensitive information in the performance of official duties and who has been granted authorized access at the required level. The responsibility for determining whether the requestor should be authorized rests with the person who has possession, knowledge or control of the sensitive information.



Campus Network - Local Area Network (LAN) connections, Wide Area Network (WAN) connections and nodes connected to the WVU backbone network infrastructure.

Communications Closet - Any enclosure/room that contains network (data, voice and video) infrastructure equipment.


Data Resources - Information stored by WVU in any system, service or file in either electronic or paper format.

Departmental Account - An Electronic Account used by multiple, authorized individuals for a very specific purpose.

De-Provisioning - The process of removing or disabling user access to data and technology resources. The term typically is used in reference to enterprise-level resource management.


Electronic Account - Used to identify individuals by username and password for authenticated access to University data and technology resources.

Enterprise - Any and all faculty, staff, students, members of the WVU community, sponsors, or sponsored guests on all campuses or regional locations.



Guest Account - A short-term temporary individual Electronic Account assigned to a non-WVU employee.



Interested Party - Person or group who has a recognizable stake in the policy, standard, or procedure, but may not be directly involved in the development process.

Identity and Access Management Program - The program is the entire infrastructure to support the Identity and Access Management function for the University. This includes the system, policies, procedures, strategic planning and coordination of ongoing improvements and evolving functionality as well as the oversight responsibilities.

Identity and Access Management System - The system consists of the technical components integrating each authoritative source through the Identity Repository (IDR) to the Oracle Identity Manager (OIM) and the Integrated systems/resources, including the ID Repository application web console for addition of non-authoritative source identities, account claiming and help desk functions.

Identity Management - A broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an organization) and controlling access to the resources in that system by placing restrictions on the established identities. Identity management is the set of business processes and a supporting infrastructure for the creation, maintenance and use of digital identities.

Integrated System(s) / Resource(s) - Systems and/or resources at or affiliated with WVU that have passed Information Security Services security assessment guidelines and are connected through a common set of application components to function as part of the overall Login system, providing the ability for users to have their information (usernames and passwords) synced between these systems.

Instructional Lab - computer lab used to conduct classes or research.

Instructional Presenter - computer that is used by an individual to conduct classes or presentations.

IT Assets and Computational Resources -  Computing devices and associated peripherals such as desktop PCs, printers, scanners, wireless devices, etc., that are specifically different in operation than a server. Typically these could be identified as devices directly accessed by the user, and network control devices accessed by IT technical support staff.




Login - Credentials to be used in combination with a password to access restricted-use WVU resources.


Major Change - Changes in the scope, intention, or purpose of a policy, standard, or procedure. This includes, but is not limited to, changes in the policy statement,  enforcement or violation handling.

Minor Change - Change that does not alter the scope, intention or purpose of a policy, standard, or procedure, for example, changes in contact person(s), web addresses, phone numbers, etc.

Mobile Device - Term refers to a mobile phone, smartphone or media tablet.


Network Traffic - Any transmission of data, voice, and video utilizing the WVU campus network.        


Organizational Unit (OU) -

Oversight Committee - This is the primary committee of the IT Governance Structure. This committee approves policy and strategic plans, and deals with major issues relating to IT at WVU. The complete charter can be found at


Password - A combinations of letters, numbers, and special characters that is resistant to hacking that is used in combination with a username to access WVU resources.

Personal Password - Individual’s credential that provides entrance or access to a system, service, or file.

Personalized Individual Information - Any combination of information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual. Examples include social security numbers, street addresses, birthdates, WVU ID, driver’s license number, etc.

Policy Concept Form - Document used to initiate a new policy, standard, or procedure, or revise an existing one.

Policy Proposal Form and Template - Document used to track all information relating to a new policy, standard, or procedure, or the revision of an existing one.

Policy, Standard and Decision Support Committee - This subcommittee of the IT Governance Structure drafts and recommends IT Policy and strategic plans for IT at WVU.

Portable Computing Device - Portable personal computer is light, small, and easily transportable. This device can be powered by battery or AC and includes laptop and notebook devices.

Project - Initiative for the implementation, upgrade, modification, or enhancement of computer-based systems, services, or procedures. This specifically includes any system or service that will connect to the WVU network, systems and services that will connect with another WVU system, or a system that collects, stores, or uses WVU data. It does not include the routine replacement of desktop or laptop computers, printers, or other personal computing peripherals.

Project Concept - Document used to define a new project request.

Project Proposal Document - Document used to define the details of a project requesting approval for implementation.

Provisioning - The process of providing users with access to data and technology resources. The term typically is used in reference to enterprise-level resource management, in this case referencing all of WVU.

Privileged Account – an account with elevated or high-level administrative access rights. A person using a privileged account has the ability to access confidential information, change data or destroy data (e.g., Social Security numbers, salaries, medical information). Privileged accounts can pose a security risk to the enterprise if proper controls and procedures are not in place. The authorization and access of privileged accounts must comply with federal regulations and industry standards and are subject to audits.

Projects and Resources Committee - This subcommittee of the IT Governance Structure manages and monitors IT-related projects and resources. The complete charter can be found at



Responsible Administrator - Person assigned by the IT Policy and Decision Support Committee to develop, implement and manage a policy, standard or procedure.

Restricted WVU Resources - WVU software applications, websites, facilities and services that require authorization for the individual to use. This includes as examples: MyAccess, WVU Wireless, Libraries, STAR, PRT, Secure labs and floors in University buildings.


Server - A server is a is a physical computer dedicated to running one or more computer programs to serve the requests of other programs and/or computers.  Thus, the "server" performs computational tasks on behalf of "clients." For this document, the clients are separate computers connected to the server through the network. Depending on the computing service that it offers examples are, but not limited to, database server, file server, mail server, print server, web server, etc.

Server IT Manager - The IT Manager within the unit/department where the server is being deployed who is responsible for the planning, installation and continuing support of the server hardware and software. Alternatively identified as whoever is responsible for the direct support of the hardware and software of the server if it is not housed within a unit or department.

Service Account - an account that, like a user account, is established within one of the authentication sources such as WVU Active Directory, HSC Active Directory or Oracle Internet Directory, but that is used to run / administer a program, application or service such as a server or printer.

Smart Phone - a handheld mobile device that provides voice, email, messaging and Internet capabilities. Application stores enable the purchase of aftermarket software. Examples include devices based on BlackBerry OS, iOS, Symbian, Android, Windows Phone, Linux, Limo Foundation, webOS and Bada.


Technology Resources - Networkable, storage or communication equipment, systems or services provided by or used for WVU business.


Unauthorized - Not having official permission either through employment position or verified approval processes.

Username - A unique name assigned to only one individual/account for the purpose of authentication and identification of access of WVU resources.

Users - Individuals who access or make use of institutional technology or data resources.


Video Management Systems -  suite of fully integrated software applications designed to manage multi-unit security camera operations. A VMS provides a view of the entire infrastructure coupled with tools to control and manage security camera systems.

Virtual Private Network (VPN) - computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network.