SMU Work Environment
The Department of Human Resources partners with the Office of Police and Risk Management, the Office of Legal Affairs, and the Office of Institutional Access and Equity to support a work environment where all employees may thrive and do their best work. Maintaining a non-hostile work environment is everyone's responsibility. The following will help you understand what is expected of an SMU employee.
Click on the following links to learn more:
- Stop Harassment and Discimination tutorial
- Eliminate Campus Sexual Violence tutorial
- Data Security and Privacy tutorial
- Program for the Protection of Minors tutorial
- Alcohol and Drug Abuse Prevention - Standards of Conduct
- Code of Ethics
- Standards of Conduct
- Confidentiality and Information Management
Stop Harassment and Discimination tutorial
Training all employees to understand, prevent, and deal with workplace discrimination and harassment fosters a positive, respectful, and productive work environment where all employees may grow and thrive. New employees will complete this training, either a supervisory or non-supervisory version, within their first 90 days of employment. All employees retrain every three years. You will be automatically enrolled and will receive a link on behalf of SMU from The Law Room.
Eliminate Campus Sexual Violence tutorial
This training provides an overview of the Title IX and Campus SaVE Act programs for faculty staff, and administrators as well as covering the responsibility to report crimes on campus and who must report. This training supports the mission of creating a positive, respectful, and productive work environment for employees and students. This training link will be included in your Stop Harassment and Discrimination training link.
Program for the Protection of Minors tutorial
Each year, many children come to SMU for camps, classes and sporting events. It is our responsibility to ensure their protection and to prevent child abuse. It is also Texas state law. Our goal at SMU is to exceed state standards by requiring every administrator, faculty, and staff member to complete a training course offered via a partnership with the Dallas Children's Advocacy Center, within the first 90 days of employment. If your role at SMU requires that you complete this training, this ccourse will satisfy the state requirement. The course is available via Blackboard, SMU's on-line learning environment at courses.smu.edu.
Alcohol and Drug Abuse Prevention -
Standards of Conduct
The SMU Center for Alcohol and Drug Abuse Prevention requires all new employees to read and be familiar with the following information regarding Drug Free Schools and Campuses.
Code of Ethics
SMU has adopted a Code of Ethics that embraces the values of integrity, respect, responsibility and accountability. All new employees should be familiar with the full Code that may be found by clicking the link below, on the SMU website and in the Helpful Links section of this tutorial.
Standards of Conduct
Section 9.5 through 9.23 of the on-line SMU Policy and Procedures manual contains policies governing conduct and performance in the workplace. Please refer to the Helpful Links section to review this information.
Confidentiality and Information Management
SMU expects that all employees will maintain confidentiality and respect the privacy of others. In support of this, please read the Confidentiality and Information Management Statement. Later you will be asked to sign an Employee Statement indicating that you have been provided with the Statement, that you understand it and agree to abide by it as well as the consequences for breaching the Agreement.
Data Security and Privacy tutorial
The security of SMU data and technology systems is a top priority for the Office of Information Technology (OIT). "Data Security and Privacy" training is the first step in understanding your commitment to protecting information about yourself, others and the work generated via your role at SMU. In this tutorial, you will learn about the different types of information and best practices for securing and safeguarding the private information you create, gather, and keep.