Eastern Michigan University

 

Banner

Banner is the University‘s Enterprise Resource Planning software for campus administration. Sometimes called ERP for Enterprise Resource Planning, or BERP for Business Enterprise Resource Planning. 

Examples of Banner uses
  • Finance including Accounts Receivable, Accounts Payable, Payroll and Human Resources
  • Student Services including Admissions and Registration and Financial Aid; and Advancement (Development)
  • Student admission and registration data are used to create populated enrollment report forms for University administrators
  • Faculty obtain class student rosters with direct access. Faculty record student grades
  • University payroll issues electronic payroll stubs for employees with direct deposit of pay, and electronic employee W2’s at end of tax year
  • Human Resources tracks employee job rank, seniority, and benefits. Note: WiFi and off-campus use requires Virtual Private Network (VPN) access and use for security purposes
Laws/Regulations/Policies

Please note:  All Board of Regents and I.T. policies listed below are now available in EMU PolicyTech.  

  • EMU BOARD OF REGENTS POLICY 8.2 Access to Student Records 
  • EMU BOARD OF REGENTS POLICY 15.2 Information Technology Security and Confidentiality 
  • EMU I.T. POLICY 7.1 Statement of Confidentiality
  • EMU I.T. Standard 7.2.1 Institutional Data Owners
  • EMU I.T. Policy: 7.3 Privacy and Monitoring of Electronically-Stored Records
  • EMU I.T. POLICY 8.2 Acceptable Encryption
  • EMU I.T. POLICY 8.10 Data Encryption
  • EMU I.T. POLICY 8.11 Security Configuration Standards for non-IT Managed Systems
  • EMU I.T. POLICY 8.15 Access Control
  • EMU I.T. PROCEDURE 8.15.P.1 Access Control - DoIT Systems Privileged Access Request
  • EMU I.T. PROCEDURE 8.15.P.2 Access Control - DoIT Systems Privileged Access Termination
  • EMU I.T. PROCEDURE 8.15.P.3 Identification of Anomalous Login Activity
  • EMU I.T. POLICY 8.16 Information Security Program
Additional Resources
Using Banner

The permitted (Yes), the not permitted (No), and those needing to contact I.T. (Contact I.T.) are listed in three columns in the matrix below.

       YES

 NO
CONTACT I.T.
                        
Note: Don't see what you need? Email the I.T. Security Team at [email protected].