Computer, Communication, and Network Technology Acceptable Use
|
|
|
- Quentin Stafford
- 10 years ago
- Views:
Transcription
1 Policy V Responsible Official: Dean of University Libraries and Chief Information Officer Effective Date: April 12, 2010 Computer, Communication, and Network Technology Acceptable Use Policy Statement By accepting or using any UVM computer, network account or connection, or other information and communication technology services provided to him or her by the University, each User understands and agrees to the following (click on link for elaboration): 1. Account Responsibility: Individual Users are responsible for all uses of Universityprovided computers, network connections and accounts, and other information and communication technology services, including data backup and password maintenance, under the electronic identity assigned to them by the University. 2. Information Security: Each User who generates, collects, stores, uses, processes, administers, or maintains information to conduct University business is responsible for its appropriate use and its protection. The University will document standard practices that are required of all individuals who have those responsibilities. 3. Account Security and Information Privacy: The University strives to maintain the security of personal accounts, but Users should not presume that information in network-based file repositories or on University-owned or -administered computers and servers is private. 4. Prohibited Uses: Uses that are illegal, that are contrary to UVM policy, or that interfere with system or network performance or with other legitimate uses are prohibited. 5. Responsibility for Information: The University does not monitor and is not responsible for the contents of the accounts and other information and communication technology services it provides. Each User is responsible for all information s/he accesses, makes available, or distributes.
2 6. Personal Use of Resources: Users may use their computers, network accounts, and other information and communication technology services provided to them by the University for occasional and incidental non-university matters, except as otherwise prohibited by this or other University policy or when the use unreasonably interferes with academic uses, job performance, or system performance or operations. Personal use is subject to the terms of this Policy, including those terms regarding access to information on University computers and accounts. 7. No Personal Financial Gain: Users agree not to use computers, network connections and accounts, or other information and communication technology services for the operation of private enterprises or for private fund-raising. 8. Enforcement: Users understand that violations of this Policy may result in suspension or termination of access to UVM s network or to services available through that network and may result in disciplinary action including academic expulsion, employment termination, or criminal prosecution. 9. Administrative Interpretation: By accepting an electronic identity or using the University s resources or services, Users agree to read and abide by this Policy and its administrative interpretations as they may be amended from time to time. Reason for the Policy The University of Vermont provides a wide array of computing, communication, networking, and other information technology resources to students, staff, and faculty to advance the educational, research, and land-grant missions of the institution. Those resources are critical to the University s continued operation and to the success of our community members in their learning, teaching, scholarship, and service. This Policy sets forth the University s expectations for the acceptable use of those resources. Applicability of the Policy This Policy applies to all University of Vermont faculty, staff, students, and other individuals who use computers, network accounts, the University system, or other information and communication technology services or resources ( Users ). The Policy applies whether UVM information technology resources are accessed remotely or through the use of a Universityowned device or UVM network connection. Policy Elaboration NOTE: Each numbered Policy section is followed by an Administrative Interpretation that provides additional guidance as to the meaning of the Policy. It does not limit the plain meaning of the terms of the Policy, but, rather, seeks to provide additional information and further explain University requirements and expectations. Page 2 of 10
3 1. Account Responsibility Individual Users are responsible for all uses of University-provided computers, network connections and accounts, and other information and communication technology services, including local data backup and password maintenance, under the electronic identity assigned to them by the University. a. University-provided computers and network accounts may only be used by the individual to whom they are assigned unless otherwise authorized by the University. Access to computers and network accounts for maintenance or service purposes by persons responsible for departmental computing support and Enterprise Technology Services ( ETS ) is considered authorized. b. Responsible use includes choosing passwords that are not easily deduced by others. The University has implemented strong password management techniques to help ensure password security by requiring minimum password strength and routine changes of passwords. c. Voluntary unauthorized disclosure of a password may result in suspension, revocation, or denial of computing privileges. Technology support staff will not ask for passwords, nor should passwords be provided to them. If it is necessary to share a password with support staff, the password should be changed immediately after the work has been completed. d. Users who suspect that their University-provided computers or network accounts have been accessed without their permission must change their passwords immediately and report the suspected activity to the Information Security Office ([email protected]). 2. Information Security Each User who generates, collects, stores, uses, processes, administers, or maintains information to conduct University business is responsible for its appropriate use and its protection. The University will document standard practices that are required of all individuals who have those responsibilities. 3. Account Security and Information Privacy The University strives to maintain the security of personal accounts, but Users should not presume that information in network-based file repositories or on University-owned or administered computers or servers is private. a. Files stored in personal (home) directories are normally managed by the User, who may create or delete files or grant access to files to others. Files stored in departmental file stores are normally managed by departmental faculty and staff under the direction of department managers. Department managers may gain access Page 3 of 10
4 to or have access granted to documents or stored in faculty and staff home directories subject to formal approval (3.f.i). b. Business documents are most appropriately housed in departmental directories on institutionally-supported file servers. When an employee leaves UVM, the employee s manager is responsible for recovering University documents that are stored in personal directories or on local storage devices. c. The University cannot and does not guarantee the confidentiality of electronic information. In addition to accidental and intentional breaches of security, the University may be compelled to disclose electronic information as required by law. d. As part of its necessary backup and recovery, problem resolution, and securityincident investigation operations, ETS personnel routinely access network accounts and other computing services that the University makes directly or indirectly available to the campus community. Suspected policy or legal violations discovered during such routine operations may be reported to the Chief Information Officer (CIO) or law enforcement officials. Information accessed during routine operations may be released only as permitted by law. and other documents stored on University equipment are subject to public records laws and may be requested by and disclosed to members of the public. e. Unless otherwise prohibited by law, and subject to legal requirements, the University and law enforcement personnel may access computers, network accounts or any other electronic information or technology necessary to investigate suspected unlawful activity or violations of University policy. f. For accounts granted to University employees, and for University-owned or University-administered computers they use: 4. Prohibited Uses i. With the approval of the Senior Vice President or her/his designee, department heads may obtain access to the computers and the accounts of their subordinates (both current and former employees). ii. Department heads may request the suspension or termination of accounts within their departments. iii. Department heads are responsible for moving needed files off terminated employees' accounts and off University-owned or administered computers within one month of termination. Uses that are illegal, that are contrary to UVM policy, or that interfere with system or network performance or with other legitimate uses are prohibited. a. Unlawful use of computers or network accounts includes, but is not limited to, defamation; obscenity; unlawful discrimination or harassment; violation of Page 4 of 10
5 copyrights, trademarks, or licenses; and violation of other rights. Users should be aware that privacy laws in other states and other nations may differ from Vermont s laws, and it may be incumbent upon them to become familiar with those laws before using foreign facilities to support their work. b. The following acts are also expressly prohibited: i. attempts to gain unauthorized access to data or accounts (UVM s or others); ii. breach of security measures on any electronic communications system; iii. interception of electronic communication transmissions without proper authority; iv. unauthorized alteration of software or hardware configurations; v. transmission of messages, or development of other electronic information, that is falsely or inaccurately attributed to another person; vi. use of UVM computing or communication resources to harass others or falsify identity; vii. use of UVM computing or communication resources to disclose confidential information; viii. use of UVM computing or communication resources to develop or propagate computer viruses, worms, Trojan horses, keystroke loggers, etc.; and ix. allowing others to use one's University-provided information and communication technology services except as otherwise permitted. c. Individuals may not broadcast messages without the express advance approval of the Senior Vice President or his/her designee. This rule does not prohibit University administrators from communicating with their units, nor representatives with their constituencies, nor does it prohibit systems managers from broadcasting messages related to system management and security. d. University services shall not be used for purposes that could reasonably be expected to cause undue strain on computing facilities or interfere with others' use of or systems. Prohibited uses include but are not limited to: (i) forwarding chain letters; (ii) generating spam (exploitation of listservs or similar systems for the widespread distribution of unsolicited ); and (iii) denial of service, for example resending the same message repeatedly to one or more recipients. e. Users may not use University information or communication technology services for political campaign activities except as permitted under the Political Activities Policy. All Users must take care to avoid any implication that the University supports or opposes any political candidate, party, or campaign. f. Properly configured computers and printers may be attached to the UVM network without explicit permission. To safeguard network security and performance, no Page 5 of 10
6 other device or network service such as routers, hubs, sniffers, or wireless access points may be placed on the network without approval from ETS Telecommunication and Network Services. 5. Responsibility for Information The University does not monitor and is not responsible for the contents of the accounts and other information and communication technology services it provides. Each User is responsible for all information s/he accesses, makes available, or distributes. a. Faculty and staff engaged in professional communications are expected to adhere to the same standards of professionalism when using the medium of , blogging, or other forms of electronic communication as they would when using traditional paper-based media. Use of embedded messages, quotations, or taglines in signatures on communications relating to University business is expressly discouraged insofar as it is inconsistent with those standards or implies University endorsement or sponsorship of personal views. Failure to abide by those standards or to use a required disclaimer may give rise to disciplinary action under applicable disciplinary procedures. b. Failure to follow legal requirements with regard to the preservation and production of records, including and calendar information, may lead to disciplinary action as well as civil or criminal charges against culpable individuals. Individuals should review Policy , Records Retention Policy, and seek the advice of University legal counsel if they have questions regarding rules applicable to the preservation or production of records. 6. Personal Use of Resources Users may use their computers, network accounts, and other information and communication technology services provided to them by the University for occasional and incidental non-university matters, except as otherwise prohibited by this or other University policy or when the use unreasonably interferes with academic uses, job performance, or system performance or operations. Personal use is subject to the terms of this Policy, including those terms regarding access to information on University computers and accounts. a. Students and employees are strongly encouraged to remove any personal information they may have stored on University-owned computers and network accounts before ending their relationship with the University. Generally, the University will destroy information left on computers and network accounts. Information will be retained if retention is in the University's best interest, and the University will provide prior notice to the student or employee before such retained information is deleted. If the University extends an individual's account access beyond enrollment or employment, stored data will ordinarily be preserved until the extension has ended. Page 6 of 10
7 b. is a communication vehicle primarily intended to serve University programs, activities and operations and thus to promote fulfillment of the institutional mission. Other uses are secondary and permissible only insofar as they do not unreasonably interfere with the primary intended use. c. The University supports and respects the principles of free expression and the exchange of ideas. However, in the content of electronic communications, users must distinguish personal views from those that they are authorized to express on behalf of the University. When offering personal views in ways that may reasonably be construed as implying the support, endorsement, or opposition of the University, the material shall be accompanied by a disclaimer, such as the following: The opinions or statements expressed herein are my own and do not represent a position, opinion, or endorsement of the University of Vermont. Guidance as to when a disclaimer is necessary or desirable may be obtained from the Office of the Senior Vice President or the Office of the General Counsel. d. UVM does not indemnify users of its computing resources for material posted or distributed through electronic communications that may be subject to legal action. 7. No Personal Financial Gain Users agree not to use computers, network connections and accounts, or other information and communication technology services for the operation of private enterprises or for private fund-raising. a. University personnel may engage in fund-raising and commercial activity on behalf of the University in connection with official University-related duties or Universitysanctioned activities. b. Students residing in campus facilities are permitted to use their workstations on the campus network to advertise personal items for sale on electronic forums in accordance with those sites terms of service. Other users are permitted to use the campus network, in accordance with Section 6 above, to advertise personal items for sale on electronic forums that allow occasional, casual postings, but the advertisement(s) should not interfere with the intended purposes of those forums or with the academic uses, job performance, or system performance or operations of the campus network. 8. Enforcement Users understand that violations of this Policy may result in suspension or termination of access to UVM s network or to services available through that network and may result in disciplinary action including academic expulsion, employment termination, or criminal prosecution. Page 7 of 10
8 a. The University may temporarily suspend a User's computing privileges, network accounts, or other information and communication technology services for security or other administrative reasons. Absent extenuating circumstances, no service may be suspended pursuant to this Policy for more than ten business days unless a disciplinary process has been invoked. b. Suspected violations by students will be reported to the Student Affairs judicial system. Suspected violations by University employees, whether faculty or staff, will be reported to the employee's supervisor and handled through normal channels established for disciplinary action. For Users not subject to University disciplinary processes, accounts may be summarily suspended or terminated at the discretion of the CIO, and Users may request review of those decisions by the Dean of University Libraries and Chief Information Officer or his/her designee. c. Pending resolution of the disciplinary process, the Chief Information Officer (CIO) or designee may suspend University information and communication technology services if the alleged violation is reasonably perceived to constitute unlawful activity, pose a substantial risk to the integrity of University information and communication technology services, or present an imminent threat to the safety or welfare of the campus or members of the University community. In the event of a perceived emergency or if other exigent circumstances demand immediate action, the CIO or designee may immediately suspend information and communication technology services, and notice will be given to the User as soon after as reasonably possible. In non-emergency situations, the CIO or designee will provide the User with notice of the perceived problem and an opportunity to be heard before services are suspended. A suspension may be appealed in writing to the Provost or designee within three business days of the effective date of the suspension. The Provost or designee will provide a written decision to the CIO and the user within five business days of receipt of the appeal. The Provost's or designee's decision will remain in effect pending final resolution of the disciplinary proceeding. d. Sanctions for violations of this Policy will be imposed by the administrative official with final responsibility for resolution of the disciplinary process in use, following consultation with the CIO if sanctions involve University information and communication technology services. Sanctions with respect to University information and communication technology services may include suspension or permanent revocation of services. If a User who loses his/her computing privileges cannot perform his/her job without those services, the User's employment may be suspended or terminated. The University reserves the right to seek restitution or indemnification from a User for expenses arising from violations of this Policy. In addition, the University or third parties may pursue criminal or civil prosecution for violations of law. e. Users may be subject to discipline under this and other University policies, and users may be subject to laws in other states and nations that govern electronic communications. Page 8 of 10
9 9. Administrative Interpretation By accepting an electronic identity or using the University s resources or services, Users agree to read and abide by this Policy and its administrative interpretations as they may be amended from time to time. a. The Provost is responsible for providing administrative interpretation, which will be modified periodically in light of experience gained and legal and administrative developments. b. Individuals are responsible for reviewing this Policy and its administrative interpretations on a routine basis. Definitions Broadcast: Transmission of a message to the University community at large, or major populations thereof (such as all students, faculty, or staff), through a University server or servers. Electronic communication: Any electronic method or system used to communicate between or among individuals or groups, or to post information, including, but not limited to, and internet forums, such as social media platforms, websites, blogs, and wikis. Information and communication technology services or resources: Includes information in any form and recorded on any media, and all computer and communication resources such as equipment, storage devices and media, information in transit, and software. Includes all information that the University or its agents use in the course of conducting University business, except those materials specifically excluded from University ownership as set forth in the University s Intellectual Property Policy. Users: All University of Vermont faculty, staff, students, and other individuals who use University computers, network connectivity, network accounts, the University system, or other UVM-owned or administered information and communication technology services or resources. Procedures Details regarding ETS policies, procedures, and practices that implement this Policy are available at the ETS Information Policy and Security Operating Procedures web site ( Forms None Page 9 of 10
10 Contacts Questions related to the daily operational interpretation of this policy should be directed to: Chief Information Officer 234 Waterman Building 85 S. Prospect Street University of Vermont Burlington, Vermont (802) The Dean of University Libraries and Chief Information Officer is the UVM official responsible for the interpretation and administration of this policy. Related Documents/Policies Code of Business Conduct: FERPA Rights Disclosure Policy: Information Security Policy - Interim: Intellectual Property Policy: Enterprise Technology Services Policies and Procedures: Political Campaign Activities: Solicitation: Records Retention Policy: University Sponsored Social Media Operating Procedure: Effective Date Approved by the President on April 12, 2010 Page 10 of 10
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
Riverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of
2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of San Diego computing and network resources. This policy
IT1. Acceptable Use of Information Technology Resources. Policies and Procedures
IT1 Policies and Procedures Acceptable Use of Information Technology Resources Originator: Information Technology Governance Committee Approver: President s Council Effective: October 16, 2007 Replaces:
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Policy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
Acceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
SOUTH DAKOTA BOARD OF REGENTS. Policy Manual
SOUTH DAKOTA BOARD OF REGENTS Policy Manual SUBJECT: Acceptable Use of Information Technology Systems NUMBER: 7:1 1. Purpose The Board acquires, maintains and operates information technology systems to
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
OLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
ZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
Administrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
Acceptable Use and Security of UBC Electronic Information and Systems
The University of British Columbia Board of Governors Policy No.: 104 Approval Date: June 2013 Title: Responsible Executive: Vice-President, Academic and Provost Deputy Vice-Chancellor (UBC Okanagan) Acceptable
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
As of August 1 st, 2014 IMPORTANT LEGALLY BINDING AGREEMENT
As of August 1 st, 2014 IMPORTANT LEGALLY BINDING AGREEMENT Box, Inc. ( Box ) is making the Box Service (as defined below) available to you ( You or Your ) because You are a faculty member, staff member
Terms of Service. As of Julyl 1, 2014 IMPORTANT LEGALLY BINDING AGREEMENT
Terms of Service As of Julyl 1, 2014 IMPORTANT LEGALLY BINDING AGREEMENT Box, Inc. ( Box ) is making the Box Service (as defined below) available to you ( You or Your ) because You are a faculty member,
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
THE CITY UNIVERSITY OF NEW YORK POLICY ON ACCEPTABLE USE OF COMPUTER RESOURCES
THE CITY UNIVERSITY OF NEW YORK POLICY ON ACCEPTABLE USE OF COMPUTER RESOURCES I. INTRODUCTION CUNY s computer resources are dedicated to the support of the University s mission of education, research
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
JHSPH Acceptable Use Policy
1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
Niagara County Community College
Niagara County Community College NCCCnet Computer Usage Policy Document: NCCCnet Computer Usage Policy Owner: Chief Information Officer Version: 2.0 NCCCnet Policy Page 1 of 7 NCCCnet Use Policy Introduction:
Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES. 1. Definitions. In this regulation unless a contrary intention appears.
Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES 1. Definitions In this regulation unless a contrary intention appears Authority means (i) in relation to the central facilities and computing and
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES
RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES The following constitute the terms and conditions of access and use of the Services, as defined hereunder, which shall be deemed to have been read and
Marist College. Information Security Policy
Marist College Information Security Policy February 2005 INTRODUCTION... 3 PURPOSE OF INFORMATION SECURITY POLICY... 3 INFORMATION SECURITY - DEFINITION... 4 APPLICABILITY... 4 ROLES AND RESPONSIBILITIES...
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
Acceptable Use Policy
Acceptable Use Policy Department of Information Technology Olivet Nazarene University (815) 939-5302 Published August 2013 Ver. 4.0 Policy Overview 1. Executive Summary This summary is intended to present
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
Virginia Commonwealth University Police Department
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
Electronic Communication
Electronic Communication Information Technology Policy Identifier: IT-002 Revision Date: 10/1/2015 Effective Date: 10/18/2012 Approved by: BOR Approved on date: 10/18/2012 Table of Contents 1. Introduction...
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
Mount Wachusett Community College. Information Technology Acceptable Use Policies and Helpdesk Prioritization Practices
Mount Wachusett Community College Information Technology Acceptable Use Policies and Helpdesk Prioritization Practices January 25, 2011 Contents INFORMATION TECHNOLOGY GENERAL ACCEPTABLE USE POLICY...
Electronic Communications System
Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
Covered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
Information Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
MAINE COMMUNITY COLLEGE SYSTEM. SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks
MAINE COMMUNITY COLLEGE SYSTEM GENERAL ADMINISTRATION Section 203 SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks As with any college
BBB, EDC, EDC-RA, EGI-RA, EHC-RA, IGS, JFA, JFA-RA, JHF-RA, JOA-RA, KBA-RB, KBB Superintendent of Schools
REGULATION Related Entries: Responsible Office: MONTGOMERY COUNTY PUBLIC SCHOOLS IGT-RA BBB, EDC, EDC-RA, EGI-RA, EHC-RA, IGS, JFA, JFA-RA, JHF-RA, JOA-RA, KBA-RB, KBB Superintendent of Schools User Responsibilities
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
FKCC AUP/LOCAL AUTHORITY
FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and
BRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES
STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES Star has adopted this Acceptable Use Policy ( AUP ) to outline the acceptable use of Star s Broadband Internet
Franklin Technology Center s Code of Conduct
Franklin Technology Center s Code of Conduct Franklin Technology Center is comprised of students, faculty, staff and administrators. This community recognizes the need to establish a code of conduct that
