1 Issued by: Calvin O. Butts, III, President Effective Date: September 23, 2013 Page 1 of 5 I. POLICY & SCOPE This is the SUNY College at Old Westbury policy on College-provided access to electronic information and services, computing facilities, and networks. This policy applies to all persons accessing or using College Technology Resources. This includes students, faculty and staff, authorized guests, and all persons authorized for access or use privileges by the College, hereafter referred to as Users. Users of College Technology Resources must comply with federal and state laws, College rules and policies, and the terms of applicable contracts including software licenses. Users who engage in electronic communications with persons in other states or countries or on other systems or networks may also be subject to the laws of those jurisdictions and the rules and policies of those other systems and networks. Questions as to how the various laws, rules and resolutions may apply to a particular use of College Technology Resources should be forwarded to the College s Chief Information Officer. Legal questions should be forwarded to the College s Assistant to the President for Administration. II. PURPOSE Access to information technology is essential to the College s mission of providing College educational services of the highest quality. The pursuit and achievement of the mission of education, research, and service require that the privilege of the use of computing systems and software, internal and external data networks, as well as access to the Internet, be made available to all in the College community. The preservation of that privilege for the full community requires that each faculty member, staff member, student, and other authorized User comply with institutional and external standards for appropriate use, whether on campus or from remote locations. III. RESPONSIBILITIES All College Users are responsible for ascertaining what authorizations are necessary and for obtaining them from the Chief Information Officer before using College Technology Resources. Users are also responsible for any activity originating from their accounts which they can reasonably be expected to control. Accounts and passwords may not, under any circumstances, be used by persons other than those to whom they have been assigned by the account administrator. In cases when unauthorized use of accounts or College Technology Resources is detected or suspected, the account owner should change the password and report the incident. The College s Chief Information Officer (CIO) is responsible for providing College Technology Resources and information technology services to the campus. The CIO or designee may prevent, based on security or legitimate business concerns, in whole or in part, any User from accessing or using the Internet or College systems at any time, without notice. The College s Information Security Officer (ISO) is responsible for overseeing and coordinating the implementation of College policies governing security and privacy on Internet and -related College matters. Users should consult with the ISO if there are questions regarding the Internet, College systems and security related matters. Absent an authorized ISO position, a College-appointed committee or the CIO may serve in this role.
2 Issued by: Calvin O. Butts, III, President Effective Date: September 23, 2013 Page 2 of 5 IV. DEFINITIONS College Technology Resources (1) College owned, operated, leased or contracted computing, networking, , telephone and information resources, whether they are individually controlled, shared, standalone or networked; (2) information maintained in any form and in any medium within College Technology Resources, and (3) College voice and data networks, telephone systems, telecommunications infrastructure, communications systems and services, and physical facilities, including all hardware (desktop computers, laptops, portable handheld computing devices, personal data assistants (PDAs), smartphones, etc.), software, applications, databases, and storage media. Additionally, all creation, processing, communication, distribution, storage, and disposal of information by any combination of College Technology Resources and non-college technology resources are covered by this policy. Incidental Personal Use minimal or occasional use of College Technology Resources by Users which does not result in any measurable cost or distraction to the College and benefits the College by allowing personnel to avoid needless inconvenience. Under no circumstances may incidental personal use involve violations of the law, interfere with the fulfillment of an employee's College responsibilities, or adversely impact or conflict with activities supporting the mission of the College. User Account an established relationship between a User and a computer, network or information service. Use of the College s computer systems and network requires that a User Account be issued by the College. Every computer User Account issued by the College is the responsibility of the person in whose name it is issued. College recognized clubs and student organizations may be issued a User account. Faculty advisors shall designate a particular person(s) authorized to act on behalf of the club or organization. This person(s) is responsible for all activity on the account and will be subject to College disciplinary procedures for misuse. The following will be considered theft of services, and subject to penalties described in the Enforcement section of this policy. Acquiring a Username in another person's name; Using a Username without the explicit permission of the owner and of the Computing Services Department; Allowing one's Username to be used by another person without explicit permission of the Computing Services Department; and Using former system and access privileges after association with College has ended. V. PROCEDURES Security & Privacy Concerns The College employs various measures to protect the security of its computing resources and its User's accounts. Users should be aware, however, that the College cannot guarantee security and confidentiality. Users should therefore engage in "safe computing" practices by establishing appropriate access restrictions for their accounts, guarding their passwords and changing them regularly and avoiding web sites that have a reputation for being problematic as sources of malware. Users should also be aware that their uses of College Technology Resources are not private vis-à-vis the College. The College always retains ownership of College Technology Resources. Such ownership provides the College with an inherent right of access. While the College does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the College's Technology Resources require the backup and caching of data and communications, the logging of activity, the monitoring of
3 Issued by: Calvin O. Butts, III, President Effective Date: September 23, 2013 Page 3 of 5 general usage patterns and other such activities that are necessary for the provision of service. The university may also specifically monitor or inspect the activity and accounts of individual Users of College Technology Resources, including individual login sessions and the content of individual communications, without notice, when: The User has voluntarily made them accessible to the public, as by posting to a web page; It reasonably appears necessary to do so to protect the integrity, security, or functionality of College Technology Resources or other computing resources or to protect the College from liability; There is reasonable cause to believe that the User has violated or is violating this policy or any other law or policy; An account appears to be engaged in unusual or unusually excessive activity; and Accessing the account is otherwise required or permitted by law, including but not limited to freedom of information laws, laws governing the conduct of parties engaged in or anticipating litigation, and laws governing criminal investigations. Users shall respect the privacy of others. Users shall not intentionally view information of other Users, modify or obtain copies of other Users' files, access or attempt to access other Users' , or modify other Users' passwords without their permission. College computers and networks are designed to protect User privacy; Users shall not attempt to circumvent these protections. Restrictions & Prohibitions The College's Technology Resources are, by nature, finite. All members of the College community must recognize that certain uses of College Technology Resources may be limited for reasons related to the capacity or security of the College's information technology systems, or as required for fulfilling the College's mission. Although there is no set bandwidth, disk space, CPU time, or other limit applicable to all uses of College Technology Resources, the College may require Users of those resources to limit or refrain from specific uses if, in the opinion of the CIO, such use interferes with the efficient operations of the system. Users shall not use College Technology Resources to excess. Excessive use of College Technology Resources by a particular User, or for a particular activity, reduces the amount of resource available to satisfy the needs of other Users. Excessive use may degrade or jeopardize system functionality, and can result in significant costs to the College. Some examples of excess use may include writing a program or script, using an Internet bot to perform a repetitive task such as attempting to register for a class or purchasing concert tickets online, or keeping your computer logged into Internet radio/video and other streaming media services. Users are prohibited from using College Technology Resources for personal commercial purposes or for personal financial or other gain. Further limits may be imposed upon personal use in accordance with normal supervisory procedures concerning the use of College equipment. Users shall not develop or use procedures to alter or avoid the accounting and monitoring of the use of College Technology Resources. For example, Users may not utilize facilities anonymously or by means of an alias, and may not send messages, mail, or print files that do not show the correct Username of the User performing the operation.
4 Issued by: Calvin O. Butts, III, President Effective Date: September 23, 2013 Page 4 of 5 Users shall not circumvent or attempt to circumvent security mechanisms or the intent of a system. Users must not use College Technology Resources to gain unauthorized access to remote computers or to impair or damage the operations of computers or networks, terminals or peripherals. This includes blocking communication lines, intercepting or sniffing communications, and running, installing or sharing virus programs. Deliberate attempts to circumvent data protection or other security measures are not allowed. Users are also expected to refrain from deliberately wasteful practices such as printing unnecessarily large documents, performing endless unnecessary computations, or unnecessarily holding public computers for long periods of time when others are waiting for the same resources. Users shall not tamper with network services and wiring or extend them beyond the area of their intended use. This applies to all network wiring, hardware and in-room jacks. Users shall not use the College s network to provide Internet access to anyone outside of the College community for any purpose other than those that are in direct support of the academic mission of the College. Users must use College Technology Resources consistent with local, state and federal laws, including copyright, patent infringement and trademarks, and College policy. Examples of improper and inconsistent use of College Technology Resources include but are not limited to: Forwarding appeals soliciting donations to individuals or charities unless approved by a Vice President or Department Head; Distributing communications that promote religious, political or personal preferences and activities; Sending or forwarding messages containing libelous, defamatory, offensive, sexist, racist or obscene remarks; Forging or attempting to forge messages, or disguise identity; Utilizing a personal account (i.e. AOL, Yahoo!, Gmail, Hotmail, etc.) to conduct Collegerelated matters; Downloading, using or distributing illegally obtained media (e.g. software, music, movies); and Uploading, downloading, distributing or possessing pornography. Group/Mass Communications Many academic and administrative entities on campus are interested in using and other digital communication services, such as text messaging, to send important but unsolicited messages to large segments of the College community: for example, to all students, all faculty, all staff, or to some combination of these large segments. To moderate the use of sending College-wide digital messages, the College will employ its Rave Alert Notification System to reach the College community on an opt-in basis. Mass communications should be used sparingly. If a faculty member, staff or student desires to send an message to multiple parties at the same time for group announcements or news, an distribution list can be created within the Rave System. Distribution lists and groups within the College system will be moderated and monitored by the Information Security Officer (ISO) for proper usage; and If a distribution list or group becomes inactive for a period of six months, it will be removed from the College system.
5 Issued by: Calvin O. Butts, III, President Effective Date: September 23, 2013 Page 5 of 5 Mass digital communications can also be utilized when a College emergency or an urgent need-to-know matter warrants their use. If a College-wide digital message is deemed appropriate and time-critical by the Office of the President, University Police, or the Office of Institutional Advancement, the message should be sent to Office of Institutional Advancement for distribution to the intended parties. Appropriate content topics include, but are not limited to: Urgent security (physical and electronic) matters; Natural disaster alerts; Significant campus-wide policy changes; and Time-critical administrative announcement. Enforcement: Users who violate this policy may be denied access to College Technology Resources and may be subject to progressive disciplinary action up to possible expulsion or dismissal. Alleged violations will be handled through the College disciplinary procedures applicable to the User. The College may suspend, block or restrict access to an account, independent of such procedures, when it reasonably appears necessary to do so in order to protect the integrity, security, or functionality of College or other computing resources or to protect the university from liability. The College may also refer suspected violations of applicable law to appropriate law enforcement agencies. When the Department of Computing Services becomes aware of a possible violation, an investigation will be initiated in conjunction with the College s ISO and relevant campus offices. Users are expected to cooperate fully in such investigations when requested. To prevent further unauthorized activity during the course of such an investigation, Computing Services may suspend access to all computing facilities for the User(s) involved in the violation. VI. REFERENCES For additional guidance related to this policy please refer to: New York State Laws and Notices New York State Information Technology Policy IT Best Practice Guideline: Acceptable Use of Information Technology (IT) Resources VII. REVIEW & APPROVAL This policy was prepared by the Division of Business & Finance and reviewed by the College s Chief Information Officer, the Assistant to the President for Administration, the Assistant to the President for Advancement and the Vice President and CFO prior to approval by the President. This policy supersedes previously issued College Policies B-03 Procedures and C-01 Internet Security Policy.
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Marist College Information Security Policy February 2005 INTRODUCTION... 3 PURPOSE OF INFORMATION SECURITY POLICY... 3 INFORMATION SECURITY - DEFINITION... 4 APPLICABILITY... 4 ROLES AND RESPONSIBILITIES...
Delgado Community College Information Technology Security Policy Approved: *November 5, 2010 ) Delgado Community College IT Security Policy Page 2 *November 5, 2010 Table of Contents Title Page 1.0 Introduction
Information Technology Policies and Procedures Wakulla County School District March 2014 Table of contents TABLE OF CONTENTS... 1 1.0 OVERVIEW... 2 2.0 PURPOSE... 2 3.0 SCOPE... 2 4.0 ACCEPTABLE USE POLICY...
Harvard Medical School Information Security Policy Contents: I. Access Control... 4 II. Fixed Password Management... 4 III. Third Party Disclosures... 5 IV. Dissemination of Information... 5 V. Establishing
Jefferson County School District Information Technology Policies and Procedures 575 S. Water Street Monticello, FL 32344 (850) 342-0100 www.jeffersonschooldistrict.org June 2014 Table of Contents 1.0 Overview...
The Archbishop s Seminary Information Security Policy 1 Contents PURPOSE... 4 SCOPE... 4 POLICY STATEMENTS... 5 INFORMATION SECURITY POLICY... 5 THE SCHOOL S RIGHT TO ACCESS ITS PROPERTY... 5 THE SCHOOL
NORTHWEST OHIO COMPUTER ASSOCIATION PROGRAM OF THE NORTHERN BUCKEYE EDUCATION COUNCIL NETWORK MANAGEMENT SECURITY POLICY The Board of Directors and staff of the Northwest Ohio Computer Association Program
Location: The Juilliard School Irene Diamond Building Main Office Room: 248 Phone: 212-799-5000 ext. 7121 Email: email@example.com Website: Information Technology Computer Labs There are two computer
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
Business Acceptable Use Policy Policy Introduction The following are policies ( these Policies ) for use of Internet access service that is provided by Mediacom to or through any customer under a contract,
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy I. Overview RCMA supports instruction through the use of educational and administrative computers. The responsible use of
INFORMATION TECHNOLOGY User Standards and Guidelines Manual May 2010 Division of Information Technology http://www.palmbeachschools.org/it/security.asp Table of Contents 1. Introduction... 4 2. Definitions...
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
Pur pose The purpose of this policy is to establish direction, procedures, requirements, and responsibilities to ensure the appropriate protection of the Lisbon Public Schools computer and telecommunication
Version 2.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
OPEN INTERNET REFERENCE SHEET Table of Contents I. In General... 4 II. Payment Terms... 4 A. In General... 4 B. Payment Method... 6 C. Payment Default... 7 II. Prohibited Uses of the Services; Acceptable
University of Rochester School of Medicine and Dentistry Student Handbook INTRODUCTION This official student handbook has been compiled to inform students about institutional policies as well as to identify
Information Security Policy The purpose of this Policy is to describe the procedures and processes in place to ensure the secure and safe use of the federation s network and its resources and to protect
HIGH SPEED INTERNET & VOICE SERVICES GENERAL TERMS AND CONDITIONS GENERAL TERMS AND CONDITIONS...2 1. Introduction...2 2. Changes in Terms...2 3. Charges, Billing, and Payment...2 4. Installation by DNG...3
1 BRINDLEE MOUNTAIN TELEPHONE COMPANY S ACCEPTABLE USE POLICY THIS AGREEMENT is entered into between Brindlee Mountain Telephone Company ( Brindlee or Company ) and the person or entity who makes use of
Mediacom Online Internet Access Service Customer and User Agreement The following are terms and conditions for use of Internet access and related services offered to residential, business and other subscribers
Internet & Cell Phone Usage Policy The Internet usage Policy applies to all Internet & Cell phone users (individuals working for the company, including permanent full-time and part-time employees, contract
Hamilton College Administrative Information Systems Security Policy and Procedures Approved by the IT Committee (December 2004) Table of Contents Summary... 3 Overview... 4 Definition of Administrative
1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose