Responsible Use of Technology Resources Policy
Individuals are accountable for their actions and all activity involving the accounts for which they have responsibility.
|Policy Number||Policy Owner|
|10019.2||Information Technology Services|
- 1.0 Purpose
- 2.0 Revision History
- 3.0 Units and Persons Affected
- 4.0 Policy
All users accessing the Internet on campus are assigned to or affiliated with public IP addresses. It is the responsibility of the campus to address any violations of responsible use that are impacting services outside the campus network as such violations may damage the reputation of the college.
Users must comply with all applicable federal, state, and local laws, regulations, and College policy, with respect to, but not limited to, computer use, Internet use, network security, and protection of sensitive data.
Users must make best efforts towards maintaining the integrity of their systems so that unintended violations do not occur. This includes virus and malware protection, as well as eliminating any potential back door entry points to the network segment they operate in. Remote access for support purposes may be allowed if coordinated with Network Operations and deemed secure.
In addition to protecting the integrity of the College, users must also not intentionally interfere with, or unintentionally cause interference to, other services and users on the campus network.
It is imperative that each organization and individual understands that any violation will result in termination of network service until the violation has been addressed and sufficient proof is provided that the violation will not occur again.
While using college-provided technology services and equipment in any format, users are expected to:
4.1 Respect the rights of others. For example:
4.1.1 Users will comply with all College policies regarding sexual, racial, and other forms of harassment and disorderly conduct.
4.2 Respect the intended usage of resources. For example:
4.2.1 Users will use only the unique account assigned, users will not share their account with others, and users will abstain from any activity that abuses system resources such as chain letters, flooding/spamming, etc.
4.2.2 Users will not utilize college-provided technology resources to engage in unsanctioned commercial or profit-making enterprises.
4.3 Respect the legal protection provided by copyright and licensing of programs and data. For example:
4.3.1 Users will not make copies of a licensed software program or make multiple copies of information that is protected under copyright law.
4.4 Respect the integrity of system and network resources. For example:
4.4.1 Users will not breach system security through any means, including hacking, viruses, Trojan horses, password grabbing, and disk scavenging or the addition of unauthorized network equipment or provide any means of unauthorized network access.
4.4.2 Users will not view, copy, alter or destroy any data, or connect to a host on the network without explicit permission of the owner.
4.4.3 Users will not tamper with network equipment, wiring, or jacks.
4.4.4 Users will not resell or provide access to the network to anyone not formally affiliated with the College without receiving prior permission.
4.4.5 Users will not use the campus network to circumvent protection schemes or exercise security loopholes in any computer or network component.
4.5 Respect the intended usage of computer systems and networks for electronic exchange (such as e-mail, Internet, World Wide Web, etc.). For example:
4.5.1 Users will not send forged or anonymous e-mail, read another person's electronic mail, send chain letters, conduct commercial activities, violate copyright, etc.
Violations of this policy may result in loss of access to college-provided technology resources and/or referral to other administrative offices for appropriate disciplinary action in accordance with College policies and applicable collective bargaining agreements. Violations of local, state, and federal laws will be referred to other appropriate law enforcement agencies.
- 5.0 Definitions
- 6.0 Responsibilities
- 7.0 Procedures
- 8.0 Forms
- 9.0 Appendix
- 10.0 Distribution and Training
For additional information about this policy, please contact the Policy Owner listed above.