Information Technology Resources: Acceptable and Responsible Use Policy

This policy establishes the boundaries of the acceptable and responsible use of college’s Information Technology resources, including but not limited to computers, networks, data, e-mail services, voice mail, telephone services, and other related computing resources. This policy intends to reflect the college’s desire to promote the free exchange of information between and among students, faculty, staff, and the world while respecting the principles of free speech and compliance with applicable communication laws.

 

College-owned computing equipment, networks, services, data, and resources are provided to conduct college- related activities and are therefore considered college property. The college, as the owner of such property, has the right to access information that is stored, sent, created, received or processed on any of its systems regardless of whether that information is under the control of students, alumni, faculty, staff, or others.

Individual users should not expect privacy when using college Information Technology resources.

Users are obligated to protect college Information Technology resources from illegal or damaging actions, either knowingly or unknowingly. This policy describes unacceptable uses of college Information Technology resources and how to report violations; however, the college may at any time make determinations that particular uses either are or are not appropriate.

  1.  Using Information Technology resources for purposes other than research, instructional, or administrative purposes is not permitted. Information Technology resources may not be used for commercial purposes or personal gain. Use of Information Technology resources for any commercial purpose, partisan political purpose, or for any unlawful purpose is not permitted.
  2. Records containing information directly related to a student are confidential and protected from public disclosure by the Family Education Rights and Privacy Act. Employees may not access any such records or disclose or distribute their contents in a manner inconsistent with federal and state law and college regulations.
  3. Making, distributing, or using unauthorized duplicates of copyrighted material, including but not limited to software applications, proprietary data, and Information Technology resources is not permitted. These actions include illegal file sharing of music, movies, productivity applications, video games, books, and other copyrighted files in violation of copyright laws.
  4. Intentionally or recklessly abusing or misusing Information Technology resources to cause damage, system interruptions, or harassment to other persons is not permitted.
  5. Repeatedly or purposefully engaging in activities which can unreasonably tax computing resources or go beyond their intended use is not permitted.
  6. Borrowing, lending, falsifying, allowing, or facilitating the unauthorized access to use of the college Information Technology resources by a third party is not permitted.
  7. Obtaining credentials of other persons to use college Information Technology resources is not permitted.
  8. Using media to harass or threaten other persons, or to display, design, copy, store, draw, print, or publish obscene language or graphics is not permitted.
  9. Using college Information Technology resources to gain unauthorized access to any technology resource is not permitted.
  10. Interception of communications is not permitted.
  11. Manipulation of computer data without authorization from the responsible entity is not permitted.
  12. It is not permitted to distribute software licensed by the college except as authorized by Information Technology personnel.
  13. Interfering with the operation of the college’s Information Technology resources by deliberately attempting to degrade or disrupt resource performance, security, or administrative operationincluding but not limited to the intentional introduction of any computer malware or similar disruptive force into an Information Technology resource is not permitted.
  14. Attempting to alter or connect any computing or networking component (including, but not limited to, bridges, routers, DHCP servers, wireless access points, phones, and switches) on the college grounds without prior approval is not permitted.
  15. Installation or alteration of wiring, including attempts to establish network connections or anyextension or retransmission of any computer network service without prior approval, is not permitted.
  16. Modification of college computer hardware, including the application of art onto casings, or any procedure that requires disassembly is not permitted.
  17. The use of unsanctioned Information Technology resources within the organization is not permitted. The use of employer-provided technology such as devices, services, and applications must have oversight from and be approved by the IT Department.
  18. The procurement of Information Technology resources including hardware, software, and services provided by third-parties must have oversight from, and be approved and procured by the IT Department.
  19. Reasonable accommodations will be fulfilled for reasonable requests of technology resources. Such requests must be made with no less than three business days of notice via the appropriate system such as the help desk ticketing system, lend-items checkout system, and event management system. Such requests include but are not limited to onboarding of new personnel and students, lending equipment, setting up equipment for events such as graduation, moving offices.
  20. Violations of this policy should be reported immediately to Information Technology, Human Resources, or the Responsible Executive. Violations of this policy will result in appropriate disciplinary action, which may include loss of computing privileges, suspension, termination, expulsion from the college, and legal action.

 

Residential Networking and Computing: Acceptable and Responsible Use Policy

 

In addition to the above restrictions for the general College community, resident students have an additional obligation to use networking resources in residential housing responsibly. The college provides network connections and support to students in support of college curricular and co-curricular missions. It is the responsibility of every student to use these resources appropriately and in compliance with all college, local, state, and federal laws and regulations. Students are solely responsible for their devices and how those devices make use of residential network connections and will be held accountable for any violations that occur in connection with their use. Students who allow their devices to be used by others will continue to be held accountable for any action committed with their equipment even if another user commits the action.

 

This policy describes unacceptable uses of residential networking resources in residential housing and how to report violations; however, the college may at any time make determinations that particular uses are and are not appropriate.

  1. Altering, augmenting or interfering with residential networking services, equipment, wiring or jacks is not permitted.
  2. Attaching a server to the residential network is not permitted.
  3. Regardless of intent, use of file sharing (peer-to-peer) software over the residential network is not permitted.
  4. Direct access to residential networking equipment such as switches and firewalls and other devices in a location normally inaccessible is not permitted.

Violations of this policy should be reported immediately to the Office of Student Affairs, Human Resources, or the Responsible Executive. Violations of this policy will result in appropriate disciplinary action, which may include loss of residential networking privileges, suspension, expulsion from the college, and legal action.