Electronic Communication
|
|
|
- Ruth Wright
- 10 years ago
- Views:
Transcription
1 Electronic Communication Information Technology Policy Identifier: IT-002 Revision Date: 10/1/2015 Effective Date: 10/18/2012 Approved by: BOR Approved on date: 10/18/2012 Table of Contents 1. Introduction Purpose Scope Policy Authority Definitions Provisions No Expectation of Privacy Assurance Enforcement Exceptions Exception Request Disclaimer Related Publications Revision History of 7
2 1. Introduction The Connecticut State Colleges and Universities (ConnSCU) encourages the use of electronic communications to share information and knowledge in support of ConnSCU mission and goals. To this end, ConnSCU provides and supports interactive, electronic communications resources and services. 2. Purpose The purpose of this Policy is to: Promote the use of electronic communication as an official means of communication within ConnSCU Ensure that ConnSCU electronic communications resources are used for purposes appropriate to the ConnSCU mission and goals; Prevent disruptions to and misuse of ConnSCU electronic communications resources and services; Ensure that the ConnSCU community is aware that use of ConnSCU electronic communications resources is subject to state and federal laws and the ConnSCU policies; and Ensure that electronic communications resources are used in compliance with those laws and the ConnSCU policies. 3. Scope This Policy applies to: All electronic communications resources owned or managed by ConnSCU including the content of electronic communications, electronic attachments and transactional information associated with such communications; All electronic communications resources provided by ConnSCU through contracts and other agreements with ConnSCU; All users and uses of ConnSCU electronic communications resources; and All ConnSCU electronic communications records in the possession of ConnSCU employees or other users of electronic communications resources provided by ConnSCU. 4. Policy Authority This policy is issued by the Board of Regents for Higher Education for the ConnSCU. 5. Definitions The following terms are used in this Policy. Knowledge of these definitions is important to an understanding of this Policy: 2 of 7
3 Electronic Communication: Any communication that is broadcast, created, sent, forwarded, replied to, transmitted, stored, held, copied, downloaded, displayed, viewed, read, or printed by one or several electronic communications services, including but not limited to and telephone. Electronic Communications Records: Electronic transmissions or messages created, sent, forwarded, replied to, transmitted, distributed, broadcast, stored, held, copied, downloaded, displayed, viewed, read, or printed by one or several electronic communications services. This definition of electronic communications records applies equally to the contents of such records, attachments to such records, and transactional information associated with such records. Electronic Communications Resources: Any combination of telecommunications equipment, transmission devices, electronic video and audio equipment, encoding or decoding equipment, computers and computer time, data processing or storage systems, computer systems, servers, networks, input/output and connecting devices, and related computer records, programs, software, and documentation that supports electronic communications services. Electronic Communications Services: Any messaging, collaboration, publishing, broadcast, or distribution system that depends on electronic communications resources to create, send, forward, reply to, transmit, store, hold, copy, download, display, view, read, or print electronic records for purposes of communication across electronic communications network systems between or among individuals or groups, that is either explicitly denoted as a system for electronic communications or is implicitly used for such purposes. 6. Provisions ConnSCU encourages the use of electronic communications resources for legitimate and authorized academic and administrative purposes and makes them widely available to the ConnSCU community. To insure the reliable operation of these resources, their use is subject to the following: is an official means for communication within ConnSCU unless otherwise prohibited by law. The colleges and universities reserve the right to send official communications to employees and students via . In the event of an emergency, the colleges and universities shall utilize all available communication mechanisms including to reach employees and students. All employees and students will be given official college/university accounts. Official university communications shall be sent to official college/university addresses. Employees and students are expected to check their official accounts on a frequent and consistent basis in order to stay current with campus related communications. Failure to receive or read official communications does not absolve the employee or student from knowing and complying with the content of such official communications. Employees are not allowed to conduct official ConnSCU business via private (unofficial) accounts unless specifically authorized. Students, who choose to have their s auto-forwarded to private (unofficial) addresses, do so at their own risk. The college/university is not responsible for any difficulties that may occur in the transmission of the s. 3 of 7
4 Contents of all electronic communications shall conform to state and federal laws and ConnSCU policies regarding protection of privacy, intellectual property, copyright, patents and trademarks Using electronic communications resources for any purpose restricted or prohibited by state and federal laws, regulations or ConnSCU policies is prohibited. Using electronic communications resources for monetary gain or for commercial, religious, or political purposes that are not directly related to ConnSCU institutional missions or otherwise authorized by appropriate ConnSCU authority is prohibited. Usage that directly or indirectly causes strain on the electronic communications resources is prohibited. Capturing, opening, intercepting or obtaining access to electronic communications, except as otherwise permitted by the appropriate ConnSCU authority is prohibited. Using electronic communications to harass or intimidate others or to interfere with the ability of others to conduct ConnSCU business is prohibited. Users of electronic communications resources shall not give the impression that they are representing, giving opinions or otherwise making statements on behalf of ConnSCU unless authorized to do so. Directly or by implication, employing a false identity (the name or electronic identification of another), except under the following circumstances, is prohibited: o A supervisor may direct an employee to use the supervisor's identity to transact ConnSCU business for which the supervisor is responsible. In such cases, an employee's use of the supervisor's electronic identity does not constitute a false identity. o A user of the ConnSCU electronic communications services may not use a pseudonym (an alternative name or electronic identification for oneself) for privacy or other reasons, unless authorized by an appropriate ConnSCU authority for business reasons. Forging headers or content (i.e., constructing an so it appears to be from someone else) is prohibited. Unauthorized access to electronic communications or breach any security measure is prohibited. Interfering with the availability of electronic communications resources is prohibited, including but not limited to the following: (i) sending or forwarding chain letters or their equivalents in other electronic communications services; (ii) "spamming," i.e., sending electronic junk mail or junk newsgroup postings; (iii) "letter-bombing," i.e., sending an extremely large message or sending multiple messages to one or more recipients to interfere with the recipient s use of electronic communications resources; or (iv) intentionally engaging in other practices such as "denial of service attacks," i.e., flooding the network with traffic. Distribution of an electronic mail to the entire or a substantial portion of a campus community must obtain prior approval as specified by the receiving institution. 7. No Expectation of Privacy All activities involving the use of ConnSCU IT systems are not personal or private. Therefore users should have no expectation of privacy in the use of these resources. Information stored, created, 4 of 7
5 sent or received via ConnSCU IT systems is potentially accessible under the Freedom of Information Act. Pursuant to Communications Assistance for Law Enforcement Act (CALEA), Public Act , and the State of Connecticut s Electronic Monitoring Notice, the Board of Regents reserves the right to monitor and/or log all activities of all users using ConnSCU IT systems without notice. This includes, but is not limited to, files, data, programs and electronic communications records without the consent of the holder of such records. 8. Assurance Each ConnSCU institution shall incorporate the Electronic Communication Policy as part of the terms and conditions for issuing institution accounts. Each ConnSCU institution shall have all fulltime and part-time employees, including student employees, acknowledge that they have read and understand the Electronic Communication Policy. Each ConnSCU institution shall make the Electronic Communication Policy accessible to all employees and students. 9. Enforcement Violations of ConnSCU information technology policy may result in appropriate disciplinary measures in accordance with local, state, and federal laws, as well as ConnSCU Policies, General Rules of Conduct for all college and university employees, applicable collective bargaining agreements, and the ConnSCU Student Conduct Codes. For purposes of protecting the ConnSCU network and information technology resources, the BOR Information Security Program Office, in conjunction with college/university IT department, may temporarily remove or block any system, device, or person from the ConnSCU network that is reasonably suspected of violating ConnSCU electronic communications policy. These non-punitive measures will be taken to maintain business continuity and information security; users of the college/university information technology resources will be contacted for resolution Exceptions ConnSCU recognizes that some portions of the Electronic Communication Policy may have to be bypassed from time-to-time because of technical or business reasons. Accordingly, exceptions may be made provided: 1. The need for the exception is legitimate and approved by the BOR CIO or designee. 2. The exception does not disrupt or compromise other portions of the ConnSCU service delivery capability. 3. The implementation of the exception is vetted through the Change Management Process. 5 of 7
6 4. The BOR Information Security Program Office, in conjunction with college/university IT department, is able to establish a monitoring function to assess the operations of the implementation exception. 5. The exception has a defined lifecycle, in that the "retirement" of the exception is scheduled (e.g., "when Release 4.9 is implemented," "at contract termination," etc.) 11. Exception Request To request an exception, please submit the Information Security Exception request to [email protected] The requestor and BOR Information Security Program Office will define the approved alternative configuration if different than the original proposal of the requestor. The exception process is NOT an alternative to the Change Control Management process. 12. Disclaimer CSCU disclaims any responsibility for and does not warrant information and materials residing on non-cscu systems or available over publicly accessible networks. Such materials do not necessarily reflect the attitudes, opinions or values of CSCU, its faculty, staff or students. 13. Related Publications Related Policies [Link to BOR Information Security Policy when approved] Related Standards and Procedures [Link to Support Services Procedure Page] Web Sites [General Link to Support Services Website] 14. Revision History Previous versions of this standard None History of Changes None 6 of 7
7 Standards superseded by this standard None 7 of 7
Electronic Communications Policy. University of California Office of the President
University of California Office of the President Issued November 17, 2000 Revised August 18, 2005 TABLE OF CONTENTS I. INTRODUCTION... 1 II. GENERAL PROVISIONS... 2 A. PURPOSE... 2 B. SCOPE... 2 C. DEFINITIONS...
BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
REGION 19 HEAD START. Acceptable Use Policy
REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
Acceptable Use Policy
1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,
ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure
ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure MANUAL: Hospital Wide SECTION: Information Technology SUBJECT: Acceptable Use of Information Systems Policy IMPLEMENTATION: 01/2011 CONCURRENCE:
Acceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 [email protected] www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
Acceptable Use Policy
Acceptable Use Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
GOSFIELD NORTH COMMUNICATIONS CO-OPERATIVE LIMITED ( GOSFIELD ) ACCEPTABLE USE POLICY
GOSFIELD NORTH COMMUNICATIONS CO-OPERATIVE LIMITED ( GOSFIELD ) ACCEPTABLE USE POLICY 1. Introduction This acceptable use policy ("Policy") sets out the principles, terms and conditions that govern the
How To Use A College Computer System Safely
1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
maintain and enforce on its user clients an acceptable use policy similar in scope and intent to this Acceptable Use Policy.
CTC Acceptable Use Policy Consolidated Telephone Company doing business as Consolidated Telecommunications Company (CTC) has adopted this Acceptable Use Policy to encourage the use of its network and services
2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
OLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
SOUTH DAKOTA BOARD OF REGENTS. Policy Manual
SOUTH DAKOTA BOARD OF REGENTS Policy Manual SUBJECT: Acceptable Use of Information Technology Systems NUMBER: 7:1 1. Purpose The Board acquires, maintains and operates information technology systems to
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
THE CITY UNIVERSITY OF NEW YORK POLICY ON ACCEPTABLE USE OF COMPUTER RESOURCES
THE CITY UNIVERSITY OF NEW YORK POLICY ON ACCEPTABLE USE OF COMPUTER RESOURCES I. INTRODUCTION CUNY s computer resources are dedicated to the support of the University s mission of education, research
Web Server & Systems Usage Policy. The WGG Associates Limited Usage Policy has been developed with the following objectives:
Web Server & Systems Usage Policy The WGG Associates Limited Usage Policy has been developed with the following objectives: Ensure security, reliability and privacy of WGG Associates Limited' systems and
Commonwealth Office of Technology
Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Acceptable Use Policy
Introduction This Acceptable Use Policy (AUP) sets forth the terms and conditions for the use by a Registrant of any domain name registered in the top-level domain (TLD). This Acceptable Use Policy (AUP)
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Acceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
Acceptable Use Policy
Acceptable Use Policy 1. Overview Nicholas Financial Inc. s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholas Financial s established culture
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
Riverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION
FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION DATE: June 10, 2015 REGULATION CHAPTER NO.: Chapter 5 REGULATION CHAPTER TITLE: Miscellaneous REGULATION TITLE AND NUMBER:
Computer, Communication, and Network Technology Acceptable Use
Policy V. 2.10.2 Responsible Official: Dean of University Libraries and Chief Information Officer Effective Date: April 12, 2010 Computer, Communication, and Network Technology Acceptable Use Policy Statement
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
Virgin Media Business Acceptable Use Policy (Internet)
Virgin Media Business Acceptable Use Policy (Internet) 1 Introduction 1.1 This Acceptable Use Policy ( AUP ) specifies actions prohibited by Virgin Media Business to users of the Internet Services (in
JHSPH Acceptable Use Policy
1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
Email Policy For Staff and Students
Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
Eastlink Acceptable Use Policy
Eastlink Acceptable Use Policy Introduction The provisions of this Acceptable Use Policy (the Policy or AUP ) apply to Eastlink Consumer and Business Customers. References to "Customer" and "You/your"
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES
STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES Star has adopted this Acceptable Use Policy ( AUP ) to outline the acceptable use of Star s Broadband Internet
Acceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
Assistant Director of Facilities
Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Department of Veterans Affairs VA DIRECTIVE 6001 LIMITED PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT INCLUDING INFORMATION TECHNOLOGY
Department of Veterans Affairs VA DIRECTIVE 6001 Washington, DC 20420 Transmittal Sheet July 28, 2000 LIMITED PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT INCLUDING INFORMATION TECHNOLOGY 1. REASON FOR
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
Acceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
ZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
