1 11.1 Campus Computer and Network Usage Policy "Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media. It encompasses respect for the right to acknowledgment, the right to privacy, and the right to determine the form, manner, and terms of publication and distribution. Because electronic information is volatile and easily reproduced, respect for the work and personal expression of others is especially critical in computer environments. Violations of authorial integrity, including plagiarism, invasion of privacy, unauthorized access, and trade secret and copyright violations, may be grounds for sanctions against members of the academic community." - The EDUCOM Code. 1. BACKGROUND AND PURPOSE This document constitutes a College-wide policy intended to allow for the proper use of all East Georgia State College computing and network resources, effective protection of individual users, equitable access, and proper management of those resources. This should be taken in the broadest possible sense. This policy applies to East Georgia State College network usage even in situations where it would not apply to the computer(s) in use. These guidelines are intended to supplement, not replace, all existing laws, regulations, agreements, and contracts which currently apply to these services. Academic Divisions may add, with the approval of the Division Chairperson, individual guidelines which supplement, but do not relax, this policy. In such cases, the Division should inform their users and Information Technology prior to implementation. Access to networks and computer systems owned or operated by East Georgia State College imposes certain responsibilities and obligations and is granted subject to College policies and local, state, and federal laws. Appropriate use should always be legal, ethical, reflect academic honesty, reflect community standards, and show restraint in the consumption of shared resources. It should demonstrate respect for intellectual property; ownership of data; system security mechanisms; and individuals' rights to privacy and to freedom from intimidation, harassment, and unwarranted annoyance. Appropriate use of computing and networking resources includes instruction; independent study; independent research; communications; and official work of the offices, departments, recognized student and campus organizations, and agencies of the College. 2. DEFINITIONS 2.1. Authorized use Authorized use of East Georgia State College-owned or operated computing and network resources is use consistent with the education, and service mission of the College, and consistent with this policy Authorized users Authorized users are: (1) current faculty, staff, and students of the College; (2) anyone connecting to a public information service (see section 6.5); (3) others whose access furthers the mission of the College and whose usage does not interfere with other users' access to resources.
2 In addition, a user must be specifically authorized to use a particular computing or network resource by the campus department responsible for operating the resource. 3. INDIVIDUAL PRIVILEGES It is the following individual privileges, all of which are currently existent at East Georgia State College, that empower each of us to be productive members of the campus community. It must be understood that privileges are conditioned upon acceptance of the accompanying responsibilities Privacy To the greatest extent possible in a public setting we want to preserve the individual's privacy. Electronic and other technological methods must not be used to infringe upon privacy. However, users must recognize that East Georgia State College computer systems and networks are public and subject to the Georgia Open Records Act. Users, thus, utilize such systems at their own risk Freedom of expression The constitutional right to freedom of speech applies to all members of the campus no matter the medium used Ownership of intellectual works People creating intellectual works using East Georgia State College computers or networks, including but not limited to software, should consult Determination of Rights and Equities in Intellectual Properties (Board of Regents Policy Manual, section 6.3 and any subsequent revisions), and related East Georgia State College policies Freedom from harassment and undesired information All members of the campus have the right not to be harassed by computer or network usage by others. (See section ) 4. INDIVIDUAL RESPONSIBILITIES Just as certain privileges are given to each member of the campus community, each of us is held accountable for our actions as a condition of continued membership in the community. The interplay of privileges and responsibilities within each individual situation and across campus engenders the trust and intellectual freedom that form the heart of our community. This trust and freedom are grounded on each person's developing the skills necessary to be an active and contributing member of the community. These skills include an awareness and knowledge about information and the technology used to process, store, and transmit it Common courtesy and respect for rights of others You are responsible to all other members of the campus community in many ways, including to respect and value the rights of privacy for all, to recognize and respect the diversity of the population and opinion in the community, to behave ethically, and to comply with all legal restrictions regarding the use of information that is the property of others.
3 Privacy of information Files of personal information, including programs, no matter on what medium they are stored or transmitted, may be subject to the Georgia Open Records Act if stored on East Georgia State College's computers. That fact notwithstanding, no one should look at, copy, alter, or destroy anyone else's personal files without explicit permission (unless authorized or required to do so by law or regulation). Simply being able to access a file or other information does not imply permission to do so. Similarly, no one should connect to a host on the network without advance permission in some form. People and organizations link computers to the network for numerous different reasons, and many consider unwelcome connects to be attempts to invade their privacy or compromise their security Intellectual property You are responsible for recognizing (attributing) and honoring the intellectual property rights of others Harassment No member of the community may, under any circumstances, use East Georgia State College's computers or networks to libel, slander, or harass any other person. The following shall constitute Computer Harassment: a. Intentionally using the computer to annoy, harass, terrify, intimidate, threaten, offend or bother another person by conveying obscene language, pictures, or other materials or threats of bodily harm to the recipient or the recipient's immediate family b. Intentionally using the computer to contact another person repeatedly with the intent to annoy, harass, or bother, whether or not any actual message is communicated, and/or where no purpose of legitimate communication exists, and where the recipient has expressed a desire for the communication to cease c. Intentionally using the computer to contact another person repeatedly regarding a matter for which one does not have a legal right to communicate, once the recipient has provided reasonable notice that he or she desires such communication to cease (such as debt collection) d. Intentionally using the computer to disrupt or damage the academic, research, administrative, or related pursuits of another e. Intentionally using the computer to invade the privacy, academic or otherwise, of another or the threatened invasion of the privacy of another Responsible use of resources You are responsible for knowing what information resources (including networks) are available, remembering that the members of the community share them, and refraining from all acts that waste or prevent others from using these resources or from using them in whatever ways have been proscribed by the College and the laws of the State and Federal governments. Details regarding available resources are available in many ways, including consulting with the Information Technology Department at East Georgia State College, conferring with other users, examining on-line and printed references maintained by Information Technology and others, and visiting the Student Computer Labs.
4 4.3. Game playing College computing and network services are not to be used for recreational game playing. East Georgia State College reserves the right to block access to recreational game-playing web sites that may be accessed by any or all personal computers, laptops, servers, or similar computerized equipment attached to the East Georgia State College data network Information integrity It is your responsibility to be aware of the potential for and possible effects of manipulating information, especially in electronic form, to understand the changeable nature of electronically stored information, and to verify the integrity and completeness of information that you compile or use. Do not depend on information or communications to be correct when they appear contrary to your expectations; verify it with the person who you believe originated the message or data Use of desktop systems You are responsible in coordination with Information Technology for the security and integrity of College information stored on your personal desktop system. This responsibility includes making regular disk backups, controlling physical and network access to the machine, and installing and using virus protection software. Avoid storing passwords or other information that can be used to gain access to other campus computing resources Access to facilities and information The "Rules for Use of East Georgia State College Computer Laboratories" should be followed regarding the general use of all College Computer Labs and the equipment contained in each lab. These rules are posted in each computer laboratory and are accessible on the College web page Sharing of access Computer accounts, passwords, and other types of authorization are assigned to individual users and must not be shared with others. You are responsible for any use of your account Permitting unauthorized access You may not run or otherwise configure software or hardware to intentionally allow access by unauthorized users. (See section 2.2.) Use of privileged access Special access to information or other special computing privileges are to be used in performance of official duties only. Information that you obtain through special privileges is to be treated as private Termination of network / account access When a student, faculty or staff member (including instructors and participants of continuing education courses or other guests of East Georgia State College requiring network access / accounts) is no longer an active member of East Georgia State College, the individual's network / account access will be terminated accordingly. The following list includes but is not limited to categories and situations that warrant the termination of an EGSC network / account: Students: Students who have graduated from EGSC; students in non-attendance for one or more academic years. This information will be obtained and monitored via the BANNER student system.
5 Faculty / Staff: Termination of employment, resignation, retirement. For staff and faculty whose employment with EGSC is terminated, the respective network / account will be terminated the same date as the employment termination date. In order for the necessary network / account termination process to take place on the day of termination, the college's Office of Human Resources will inform the Vice President for Information Technology concerning faculty and staff employment terminations. Guests of EGSC requiring temporary network / account access: Temporary guest network / account access will be terminated immediately upon the completion / conclusion of event(s) where an EGSC guest network / account access was required. For all categories, (students, faculty / staff, CE Instructors & participants, and guest users) immediate termination of network / account access will occur in the event an individual uses an EGSC network / account in an unauthorized manner. The sections (4.7 through 4.12) listed below include but are not limited to types of activities that could be deemed as unauthorized use of an EGSC network / account and could lead to termination of network / account access Attempts to circumvent security Users are prohibited from attempting to circumvent or subvert any system's security measures. This section does not prohibit use of security tools by system administration personnel Decoding access control information You are prohibited from using any computer program or device to intercept or decode passwords or similar access control information Denial of service Deliberate attempts to degrade the performance of a computer system or network or to deprive authorized personnel of resources or access to any College computer system or network are prohibited Harmful activities The following harmful activities are prohibited: a. creating or propagating viruses b. disrupting services c. damaging files d. intentional destruction of or damage to equipment, software, or data belonging to East Georgia State College or other users, and the like File sharing and P2P activities File sharing and peer-to-peer (P2P) activities are not allowed on the East Georgia State College data network.
6 Unauthorized access You may not: a. damage computer systems, obtain extra resources not authorized to you, deprive another user of authorized resources, gain unauthorized access to systems, by using knowledge of: b. a special password, loopholes in computer security systems, another user's password, access abilities you used during a previous position at the College Unauthorized monitoring You may not use computing resources for unauthorized monitoring of electronic communications Academic dishonesty You should always use computing resources in accordance with the high ethical standards of the College community. Academic dishonesty (plagiarism, cheating) is a violation of those standards Use of copyrighted information and materials You are prohibited from using, inspecting, copying, and storing copyrighted computer programs and other material, in violation of copyright Use of licensed software No software may be installed, copied, or used on College resources except as permitted by the owner of the software. Software subject to licensing must be properly licensed and all license provisions (installation, use, copying, number of simultaneous users, term of license, etc.) must be strictly adhered to Political campaigning; commercial advertising Board of Regents policy (section 9.6.1) states "The use of USG materials, supplies, equipment, machinery, or vehicles in political campaigns is forbidden. The use of College computers and networks shall conform to these policies Personal business Computing facilities, services, and networks may not be used in connection with compensated outside work nor for the benefit of organizations not related to East Georgia State College, except: in connection with scholarly pursuits (such as faculty publishing activities); or in a purely incidental way. This and any other incidental use (such as electronic communications or storing data on single-user machines) must not interfere with other users' access to resources (computer cycles, network bandwidth, disk space, printers, etc.) and must not be excessive. State law restricts the use of State facilities for personal gain or benefit. 5. EAST GEORGIA STATE COLLEGE PRIVILEGES Our society depends on institutions like East Georgia State College to educate our citizens and advance the development of knowledge. However, in order to survive, East Georgia State College must attract and responsibly manage financial and human resources. Therefore, East Georgia State College has been granted by the State, and the various other institutions with which it deals, certain privileges regarding the information necessary to accomplish its goals and to the equipment and
7 physical assets used in its mission Allocation of resources East Georgia State College may allocate technology resources in differential ways in order to achieve its overall mission Control of access to information East Georgia State College may control access to its information and the devices on which it is stored, manipulated, and transmitted, in accordance with the laws of Georgia and the United States and the policies of the College and the Board of Regents Imposition of sanctions East Georgia State College may impose sanctions and punishments on anyone who violates the policies of the College regarding computer and network usage System administration access A System Administrator (i.e., the person responsible for the technical operations of a particular machine) may access others files for the maintenance of networks and computer and storage systems, such as to create backup copies of media. However, in all cases, all individuals' privileges and rights of privacy are to be preserved to the greatest extent possible Monitoring of usage, inspection of files Departments of East Georgia State College operating computers and networks may routinely monitor and log usage data, such as network session connection times and end-points, CPU and disk utilization for each user, security audit trails, network loading, etc. These units may review this data for evidence of violation of law or policy, and other purposes. When necessary, these units may monitor all the activities of and inspect the files of specific users on their computers and networks. Any person who believes such monitoring or inspecting is necessary must obtain the concurrence of the Office of the Vice President for Student Affairs and Information Technology. In all cases all individuals' privileges and right of privacy are to be preserved to the greatest extent possible Suspension of individual privileges Departments of East Georgia State College operating computers and networks may suspend computer and network privileges of an individual for reasons relating to his/her physical or emotional safety and well-being, or for reasons relating to the safety and well-being of other members of the campus community, or College property. Access will be promptly restored when safety and well-being can be reasonably assured, unless access is to remain suspended as a result of formal disciplinary action imposed by the Office of the Vice President for Student Affairs (for students) or the employee's department in consultation with the Vice President for Fiscal Affairs (for employees). 6. EAST GEORGIA STATE COLLEGE RESPONSIBILITIES 6.1. Security procedures East Georgia State College has the responsibility to develop, implement, maintain, and enforce appropriate security procedures to ensure the integrity of individual and institutional information, however stored, and to impose appropriate penalties when privacy is purposefully abridged.
8 6.2. Anti-harassment procedures East Georgia State College has the responsibility to develop, implement, maintain, and enforce appropriate procedures to discourage harassment by use of its computers or networks and to impose appropriate penalties when such harassment takes place Upholding of copyrights and license provisions East Georgia State College has the responsibility to uphold all copyrights, laws governing access and use of information, and rules of organizations supplying information resources to members of the community (e.g., acceptable use policies for use of Internet) Individual department responsibilities Each department has the responsibility of: a. enforcing this policy b. providing for security in their areas c. providing individuals equipped with College-owned desktop systems with resources for regular disk backups (software, hardware, media, and training) If warranted by the importance and sensitivity of information stored and processed in their facility on College-owned desktop systems, a department also has the responsibility of: a. performing and verifying integrity of regular media backups b. employing appropriate security-related software and procedures c. guarding confidentiality of private information, including user files and system access codes d. controlling physical access to equipment e. providing proper physical environment for equipment f. providing safeguards against fire, flood, theft, etc. g. providing proper access administration; e.g., prompt and appropriate adjustment of access permissions upon a user's termination or transfer h. controlling and recording software and configuration changes i. monitoring any system logs for access control violation attempts East Georgia State College s Information Technology Department or appointed representative(s) serves: as the first point of contact for unit personnel seeking problem resolution, information, and other assistance regarding computing and networking to facilitate interaction between the departments and the Office of Information and Instructional Technology at the Board of Regents Public information services Department and individuals may not configure computing systems to provide information retrieval services to the public at large. (Current examples include "anonymous ftp", "Web", and "gopher.") However, centralized computing hardware and software is available for delivery of public information services, where particular attention is paid to the following sections of this policy: 2.1 (authorized use [must be consistent with College mission]), 3.3 (ownership of intellectual works), 2.1, 2.2, 4.2 (responsible use of resources), 4.9 (use of copyrighted information and materials), 4.10 (use of licensed software), and 6.4 (individual unit
9 responsibilities). Usage of public services will not cause computer or network loading that impairs other services. 7. PROCEDURES AND SANCTIONS 7.1. Investigative contact If you are contacted by a representative from an external organization (District Attorney's Office, FBI, GBI, private security firm, etc.) who is conducting an investigation of an alleged violation involving East Georgia State College computing and networking resources, immediately inform the college's Vice President for Information Technology and the College's President and/or Vice President for Academic Affairs. Refer the requesting agency to the College's Vice President for Information Technology who will provide guidance regarding the appropriate actions to be taken Responding to security and abuse incidents All users and departments have the responsibility to report any discovered unauthorized access attempts or other improper usage of East Georgia State College computers, networks, or other information processing equipment. If you observe, or have reported to you (other than as in 7.1 above), a security or abuse problem with any College computer or network facilities, including violations of this policy: Take immediate steps as necessary to ensure the safety and well-being of information resources. For example, if warranted, the Information Technology Department should be contacted to temporarily disable any offending or apparently compromised computer accounts, or to temporarily disconnect or block offending computers from the network (see section 5.6). Ensure that the following departments/people are notified: (1) Vice President for Information Technology, (2) your department head for employees (2) Office of the Vice President for Academic Affairs for students. Reports of all incidents will be forwarded to Student Affairs (for apparent policy violations by students) or the department head (for employees), and to the Information Technology Department First and minor incident If a person appears to have violated this policy, and (1) the violation is deemed minor by the Information Technology Department, and (2) the person has not been implicated in prior incidents, then the incident may be dealt with at the Information Technology Department or other department level. The alleged offender will be furnished a copy of the College Computer and Network Usage Policy (this document), and will sign a form agreeing to conform to the policy Subsequent and/or major violations Reports of subsequent or major violations will be forwarded to Student Affairs (for students) or the department head (for employees) for the determination of sanctions to be imposed. Departments should consult the Office of Vice President for Fiscal Affairs/Personnel Office regarding appropriate action.
10 7.5. Range of disciplinary sanctions Persons in violation of this policy are subject to the full range of sanctions, including the loss of computer or network access privileges, disciplinary action, dismissal from the College, and legal action. Some violations may constitute criminal offenses, as outlined in the Georgia Computer Systems Protection Act and other local, state, and federal laws; the College will carry out its responsibility to report such violations to the appropriate authorities Appeals Appeals should be directed through the already-existing procedures established for employees and students of East Georgia State College.
Coffeyville Community College Computer and Network Usage Policy Computer and Network Usage Policy Page 1 Introduction "Respect for intellectual labor and creativity is vital to academic discourse and enterprise.
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
Page 1 of 10 TITLE: Network Usage Policy STATEMENT OF PURPOSE: Policy Number: AM-RM-010 This document constitutes an Organization-wide policy intended to allow for the proper use of all Neighbor To Family
University of North Georgia 2013 Appropriate Usage Policy Division of Information Technology Version 1.0 Unrestricted Information in this document, including URLs and other Internet Web site references,
Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni
Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among
RESPONSIBLE COMPUTER USE POLICY (ADOPTED AUGUST 3, 2006) on-line at www.ccc.edu I. INTRODUCTION All users shall abide by the following provisions contained herein, or otherwise may be subject to disciplinary
Computing and Network Use Policy Category: University Area Date Established: Responsible Office: Office of the Chief Information Officer Date Last Revised: - 3/26/2007 Responsible Executive: CIO Date Posted
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
Issued by: Calvin O. Butts, III, President Effective Date: September 23, 2013 Page 1 of 5 I. POLICY & SCOPE This is the SUNY College at Old Westbury policy on College-provided access to electronic information
Appendix I The City University of New York Policy on Acceptable Use of Computer Resources Introduction CUNY s computer resources are dedicated to the support of the university s mission of education, research
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
ACCEPTABLE USE OF INFORMATION SYSTEMS 1. General Principles Having access to computer systems and networks owned or operated by Holyoke Community College imposes certain responsibilities and obligations
The goal of the New Mexico Highlands University (NMHU) Computer & Networking Services (CNS) Group is to support the University in the pursuit of its Mission Statement 1. These policies, guidelines, and
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
The UMB School of Nursing follows and adheres to the UMB Campus Information Technology Acceptable Use Policy. The UMSON further defines Authorized User to also include any person who receives a password
SOUTH DAKOTA BOARD OF REGENTS Policy Manual SUBJECT: Acceptable Use of Information Technology Systems NUMBER: 7:1 1. Purpose The Board acquires, maintains and operates information technology systems to
Valdosta State University Information Resources Acceptable Use Policy Date: December 10, 2010 1. OVERVIEW... 3 2. SCOPE... 3 3. DESIGNATION OF REPRESENTATIVES... 3 3.1 UNIVERSITY PRESIDENT... 3 3.2 VICE
TYPE: INFORMATIONAL & INSTRUCTIONAL TECHNOLOGY POLICY TITLE: Technology Use Policy The technology resources at Northeast Wisconsin Technical College support the instructional, research and administrative
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
Caldwell Community College and Technical Institute Student Computer Usage Policies and Procedures I. Campus Computer Usage Overview: The purpose of this document is to define the policies and procedures
Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
Niagara County Community College NCCCnet Computer Usage Policy Document: NCCCnet Computer Usage Policy Owner: Chief Information Officer Version: 2.0 NCCCnet Policy Page 1 of 7 NCCCnet Use Policy Introduction:
IT and Network Usage Policy of International Islamic University, Islamabad POLICY STATEMENT Users of International Islamic University network and computer resources have a responsibility to properly/fairly
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
ROYALL SCHOOL DISTRICT STUDENT COMPUTER AND INTERNET ACCEPTABLE USE POLICY 1501 Academy St. Elroy, WI 53929 (608) 462-2600 Created August 2011 1 MISSION STATEMENT The Royall School District is committed
Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized
POLICY AND PAGE 1 of 7 OCTOBER 25, 2007 Tab Authority Subject Related Policies Corporate Services Information Technology Services Responsible Computing Corporate IT Guiding Principles Policy, Harassment
OFFICE OF THE PRESIDENT Policy for Responsible Use of University Computers and Information Systems 1. Purpose It is the purpose of this Executive Memorandum to set forth the University's administrative
BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,
Indiana University of Pennsylvania Information Assurance Guidelines Approved by the Technology Utilities Council 27-SEP-2002 1 Purpose... 2 1.1 Introduction... 2 1.1.1 General Information...2 1.1.2 Objectives...
Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D 1. PURPOSE SWC owns and operates a variety of computing systems which are provided for the use of the Sisseton Wahpeton
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
Computing and Communication Policy on Acceptable Use of Electronic Resources Summary This policy defines the boundaries of "acceptable use" of electronic resources, including computers, networks, electronic
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
IT1 Policies and Procedures Acceptable Use of Information Technology Resources Originator: Information Technology Governance Committee Approver: President s Council Effective: October 16, 2007 Replaces:
Westwood Baptist Church Computer use Policy I. Policy Statement The use of Westwood Baptist Church automation systems, including computers, fax machines, and all forms of Internet/Intranet access, is for
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES 1. PROCEDURE SUMMARY STATEMENT To establish procedures relating
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
Franklin Technology Center s Code of Conduct Franklin Technology Center is comprised of students, faculty, staff and administrators. This community recognizes the need to establish a code of conduct that
4526 COMPUTER NETWORK FOR EDUCATION The Southern Westchester Board of Cooperative Educational Services (BOCES) considers student access to a computer network, including the Internet, to be a powerful and
Document III UL LAFAYETTE COMPUTER & NETWORK POLICY Purpose & Scope This document sets forth the University's policy with regard to access to and use of computing and network resources by faculty, staff,
2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of San Diego computing and network resources. This policy
COMPUTER NETWORK FOR EDUCATION REGULATION 4526-R The following rules and regulations govern the use of the district's computer network system and access to the Internet. I. Administration The Superintendent
Southwest Texas Telephone Company (SWTTC) Acceptable Use Policy for Asynchronous Digital Subscriber Line (ADSL)/Internet Customers Introduction When you open your SWTTC ADSL/Internet account, you become
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
POLICY 4526 COMPUTER NETWORK FOR EDUCATION The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet,
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
ACCEPTABLE USE OF INFORMATION TECHNOLOGY RESOURCES PREAMBLE. Freedom of expression and an open environment to pursue scholarly inquiry and for sharing of information are encouraged and supported at Loyola
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES Star has adopted this Acceptable Use Policy ( AUP ) to outline the acceptable use of Star s Broadband Internet
Peel District School Board POLICIES AND REGULATIONS Policy #78 DIGITAL CITIZENSHIP Digital Citizenship Digital citizenship is defined as the norms of responsible behaviour related to the appropriate use
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
INFORMATION TECHNOLOGY APPROPRIATE USE POLICY 1000.0100.12 Section 10, Information Systems Responsible College Officer: Executive Director of Information Systems/CIO Originally Issued: April 24, 2008 Original
4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS PURPOSE This policy provides the procedures, rules, guidelines and codes of conduct for the use of the technology and information networks at Socorro Consolidated
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
6.9P COMPUTER AND COMMUNICATIONS TECHNOLOGY USE REVIEWED: DECEMBER 12, 2000 REVIEWED: MARCH 11, 2008 REVIEWED: MAY 8, 2012 Sonoma County Junior College District is committed to complying with all applicable
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
Acceptable Use of Information Technology Policy Bergen Community College reserves the right to monitor its information technology resources and telecommunications network to protect the integrity of its
Tele-Media Cable Internet Acceptable Use Policy Important Note: Tele-Media may revise this Acceptable Use Policy (the "Policy") from time to time without notice by posting a new version of this document
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
DORCHESTER COUNTY, MARYLAND Fiscal Policies and Procedures Fraud, Waste & Abuse Adopted August 11, 2009 SECTION I - INTRODUCTION The County Council of Dorchester County, Maryland approved on August 11,
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,