Policies for Instructional Support Staff
General Conduct
Instructional support staff are expected to adhere to the rules of conduct
that are required of all University employees. These are detailed in
UC Berkeley Policies and Governance.
Most important:
Accounting for your Time
Planned Absences
Staff should
contact the ISG or ESG supervisor for approval of planned absences for
vacation, professional development, exams, etc. The supervisors must
insure that there will be adequate staff coverage and that planned
absences are distributed fairly amongst the staff.
Lateness and Unplanned Absences
If you are to be more than 15 minutes late or will be absent due to
sickness or for other personal reasons, please notify your colleagues
before you are due to be on the job. You should contact a real person,
rather than only leaving a message, to be certain that your message is
received.
These are good methods to inform the group of your absence:
Access to Privileged Data
Reading Users' Files
Before looking at a user's files, we should consider these guidelines:
Disciplining Students
Work-Related Injuries
Students on the University payroll, including Work Study, are covered by
the University's Workers' Compensation progeam for injuries sustained on the
job, and by the University's general liabilty self-insurance program for any
other injury or damage resulting from their employment (and for which the
University is legally liable).
Students have the same access to Workers' Compensation and Vocational
Rehabilitaion programs as regular University employees.
Student employees with work-related injuries should contact the
Occupational Health Clinic at University Health Services (Tang Center,
2222 Bancroft Way, 642-2000) or Urgent Care (643-7197).
Computer Usage
You must abide by the campus and department computer usage rules, which can
be accessed from http://inst.eecs.berkeley.edu/policies.html.
Notable rules include:
You should not share your account with others or give anyone access to
the computers or labs for purposes unrelated to our work.
You should not use the accounts or computers for copyright infringement
or any other illicit behavior.
You should not create user accounts without approval from the ISG
manager. (We have specific procedures to maintain our recordkeeping
and our usage agreement with department.)
You should not alter the network access of a computer or change the
network port that it is plugged into without informing ISG and the
IDSG network staff. (This is usually done via the EECS network
update WEB site.)
Computers on the campus networks should be secured, firewalled and
patched to current levels. If the computer you are working on
cannot maintain that standard, then it should be unplugged from
the network.
Thursday, May 02, 2019
kevinm@eecs.berkeley.edu