Planned Technology Replacement Guidelines

As of August 2023, the planned replacement cycle for computer equipment purchased by ITS is 5 years.

Full-time faculty and staff

  • Life Cycle Replacements will be budgeted as mid-range Windows laptops with a docking station and two 22” monitors.
    • Note that ITS is not responsible for furnishing home offices – additional power adapters, docking stations, monitors, peripherals (mice, cameras, keyboards, etc.), computer equipment, or furniture will be solely the responsibility of the worker.
  • Workers can choose a Windows desktop if they prefer.
    • Individuals or working groups that have a need for Apple devices will be considered on a case-by-case basis. No changes to existing user platforms are planned. If you have an Apple device as your primary workstation, ITS will continue to budget for a like device.
  • If a determination is made by the faculty member and the school administration that instructional requirements necessitate a better-than-mid-range device, individual arrangements can be made by contacting Brad Miller.
  • Workers who do not yet have a laptop issued but need to access Penn College systems off campus will be provided a method of access. Individual arrangements can be made by contacting Brad Miller.
  • The cost of any upgrades requested before the device is due to be replaced will be the responsibility of the department or school.
  • The cost of new equipment for new positions should be handled by entering a technology budget request during budget building time or covered by the school or department for which the new worker will be employed.

Part-time faculty/staff /adjuncts

  • Will be provided shared work areas in the form of multi-user desktops

Other Considerations

  • If departments or schools identify demand for hybrid work areas (shared areas where laptops can be plugged into permanently installed docking stations), individual arrangements can be made by contacting Brad Miller.
  • Departments or individuals that work with private or restricted data will be provided a secure method for handling that data.