Search

Help

Page 2 of 2. Showing 17 results (0.009 seconds)

  1. 0850 Operation and Maintenance

    Description: Documents application and server operation, performance, and maintenance performed. Examples: Records may include change logs, firewall logs, requests, scripts, system event logs, reports, system backup schedule records, and notes. Retention Period: Retain for 1 year, and then destroy.
  2. 1210 Media Files

    Description: Records related to announcements, news items, and statements released to the media or public, containing information about the University, or its programs and events. Examples: Records may include brochures, photographs of facilities, faculty, staff, and students, press releases, prospect cards, release
  3. 1400 Academic Conference Records

    years after event, and then transfer to Archives.
  4. 0770 Training and Development Program Records

    Description: Documents the office's administration of special programs such as orientation, health and wellness events, training and development courses, awards and honors, recreational activities, and any other job enrichment programs. Examples: Records may include training program development, publications
  5. 1568 Student Organization Records

    Description: Records generated from the administrative activities of Suffolk University's student clubs and organizations. Examples: Records may include budgets, financial guidelines and manuals, memos, meeting minutes, reports, legislation, constitutions, agendas, attendance and membership records, events records
  6. 0820 Application Data

    Description: These records provide protection in the event of lost or damaged files, or otherwise irretrievable files or programming code. Examples: Records include data from system back-ups, including online data files, tapes, disks or other media, and any hardcopy printouts. Retention Period: Retain until
  7. 1060 Clinical Client Case Files

    , or the running of an incarcerated defendant’s maximum period of incarceration, but in no event longer than the life of the client, then securely destroy