Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
|
|
|
- Calvin Sullivan
- 10 years ago
- Views:
Transcription
1 1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines or the school ), IT plays an integral role in the fulfillment of the school s research and educational missions and ongoing administrative operations. Taxpayers, students, other funding sources, and the public at large, expect that these assets will be used in a lawful manner to effectively and efficiently support the school s mission. Users of Mines IT assets have a responsibility not to abuse them and to respect the rights of other members of the Mines community as well as the school itself. The following policy provides for the appropriate use of Mines IT systems. 2.0 SCOPE 2.1. Applicability: This policy applies to all users of Mines IT systems including, but not limited to, Mines students, faculty, staff, guests, contractors, and visitors. It applies to the use of all Mines IT systems including systems, networks, and facilities administered by the Department of Campus Computing, Communications, and Information (CCIT), as well as those administered by individual departments, laboratories, and other Mines units. This policy also covers systems not owned or managed by Mines under certain conditions of law related to public records, copyright, and others, especially if those systems are associated with the school and periodically connected to it via networking facilities Existing Policies. Policies that already govern facilities use, freedom of expression, academic integrity, privacy, electronic mail, electronic communications with students and employees, sexual harassment, and others, may apply to IT Systems use as well. This Policy addresses circumstances which are more directly IT related and is intended to augment, not supersede, any other relevant school policies. (see Section 4.7) 2.3. Detailed Appropriate Use. Faculty, staff, and students must be aware of their department or office policies and governing documents concerning appropriate use. These documents may contain more detailed statements regarding appropriate use. Such statements may be more restrictive than this policy, but may not be more permissive. In the event of a conflict, this Information Technology will prevail. 3.0 POLICY The Colorado School of Mines seeks to provide for the following: An IT infrastructure which promotes and facilitates the educational and research missions of Mines as well as its administrative functions; IT systems which are reliable, available, and perform in a superior manner. In order to facilitate these goals, IT systems may only be used for their intended purposes, as authorized, in support of the research, educational, administrative, and other appropriate functions of Mines. Users are expected to exercise good judgment and operate under best practices in the Page 1 of 7
2 use of IT systems. All users have an ethical and a legal responsibility to use IT systems appropriately and will be held accountable for their behavior. 4.0 SPECIFIC PROHIBITIONS The following categories of IT systems use are prohibited: 4.1. Use that interferes with, stops, impedes, or impairs the intended use of an IT System, or otherwise causes harm to the activities of others. Users shall not deny or interfere with (or attempt to deny or interfere with) the operation of an IT System or impair service to other users in any way. This includes any form of monopolization, misusing mailing lists, propagating chain letters or virus hoaxes, spamming (spreading , postings, instant messages, etc., widely and without good purpose), etc. These acts (or examples), or any other behaviors which may cause excessive network traffic or computing load are prohibited Use for commercial personal gain. Mines IT resources are provided to students primarily to fulfill their academic responsibilities and obligations and to employees to fulfill their professional responsibilities. Students shall not use Mines IT resources to operate a business or for ongoing commercial activity that generates personal income. Employees shall not use Mines IT resources to operate a business or for consulting or commercial activity that generates personal income or financial gain. Certain exceptions to this restriction may exist. Rules and procedures identified in the Faculty Handbook, emeritus, separation, or similar agreements with the institution will determine and govern these exceptions Harassing or threatening use. Users shall not utilize IT systems such as or messaging services to harass or intimidate another person. Two examples include sending repeated unwanted mail and display of material known to be offensive to others (e.g. sexual material.) 4.4. Use which damages the integrity of the school or of other IT systems. Examples in this category include the following: Attempts to defeat system security. (e.g. by cracking or guessing credentials, compromising room locks or alarm systems, etc.) This provision does not prohibit CCIT or authorized systems administrators from using appropriate tools within the scope of their job responsibilities and authority Unauthorized Access or Use. Users may only use the IT Systems they are authorized to use and only for the purposes specified when their authorization was granted. Specifically: i. Users may not seek or assist others in seeking access to IT systems or to data on IT Systems that they are not authorized to access. Page 2 of 7
3 ii. Users may not use other s system credentials or allow others to use their credentials under any circumstances. iii. Users shall not intercept or access data communications (or attempt to intercept or access data communications) that are not intended for them. iv. Users shall not make or attempt to make any deliberate, unauthorized data changes on any IT system. v. Users shall not utilize or attempt to utilize any IT system to detect, attack, or exploit weaknesses in any other systems, on or off-campus. vi. Users shall not access data elements, even if coincidentally authorized, which are not required for the purposes specified in their authorization or, for employees, for purposes not required by their job duties (e.g. accessing data out of simple curiosity.) Disguised use. Users shall not conceal their identity when using IT systems unless the option of anonymous access is explicitly authorized. Users also shall not masquerade or impersonate another person or otherwise use or attempt to use a false identity in any way Violations of Privacy or Confidentiality. Whether done intentionally or not, users shall not disclose private, legally protected, or other sensitive personal information concerning a member of the Mines community, or disclose any other confidential information to which they have access, either publicly or to another individual who is not authorized to access the same information. In the event of an unintentional disclosure of personal or sensitive information users are expected to notify the CISO immediately Distribution of malware. Users shall not knowingly distribute or launch computer viruses, worms, or other malware Removal or modification of data or equipment. Without specific authorization, Users shall not remove or modify any school-owned or administered equipment or data from IT systems Use of unauthorized devices. Users shall not attach network switches, routers, wireless access points, or any other device to the campus network without authorization and proper registration. Users shall not permanently attach (physically or electronically) additional devices to IT systems managed by CCIT without authorization. Temporarily connected devices such as USB flash drives must comply with all applicable IT, data management, and security policies Use in violation of law. Illegal use of IT systems is prohibited. Illegal use means use in violation of applicable civil or criminal law at the federal, state, or local levels. Examples include: distributing, receiving, transmitting, or possessing child pornography; infringing upon any copyright, trademark, or patent; etc Compliance With Copyright Law Use of school information systems must comply with provisions of copyright law and fair use. Copyright law limits the rights of a user to decrypt, copy, edit, transmit or retransmit another s intellectual property, including Page 3 of 7
4 written materials, images, sounds, music, and performances, even in an educational context, without permission, except where such use is in compliance with Fair Use or TEACH Act provisions Use in violation of school contracts. All use of IT systems shall be in compliance with Mines contractual obligations to software vendors, research granting agencies, and any other licensing agreements Use in violation of school policy. Use of IT Systems which violates other school policies also violates this policy. See Section Use in violation of external data network policies. Users shall observe all applicable policies of external data networks when using such networks. Please note that this list of specific prohibitions is not exhaustive. With the rapid advancement of IT systems technology, other inappropriate uses may develop that are not listed above. The school reserves the right to investigate any complaints or suspicion of alleged abuse of IT systems regardless of its inclusion in this section. 5.0 RESPONSIBILITIES 5.1 Personal Account Responsibility. Users are responsible for maintaining the security of their IT Systems accounts and passwords. Accounts and passwords may not be shared with others. Users are responsible for any activity carried out under their IT Systems accounts. 5.2 Incidental Personal Use. Incidental personal use is an accepted and appropriate benefit of being associated with Colorado School of Mines technology environment. Appropriate incidental personal use of technology resources does not result in any measurable cost to the school, and benefits the school by allowing personnel to avoid needless inconvenience. Incidental personal use must adhere to all applicable school policies. Under no circumstances may incidental personal use involve violations of the law, interfere with the fulfillment of an employee's school responsibilities, or adversely impact or conflict with activities supporting the mission of the school. Note that any files stored on Mines resources are considered property of the school and subject to all school, state and federal regulations including the Colorado Open Records Act. 5.3 Encryption of Data. All data that belongs to the Colorado School of Mines that is stored on any mobile device, and disclosure of which poses a security risk, must be encrypted using an institutionally approved encryption application. Further information is available in the Administrative Data Policy, Mandatory Use of Encryption Software for Mobile Devices executive directive, and the Security Practices and Guidelines document. Page 4 of 7
5 5.4 Responsibility for Content. Official school information may be published in a variety of electronic forms. The certifying authority under whose auspices the information is published is responsible for the content of the published document. Users also are able to publish information on IT systems or over Mines networks. Neither Mines nor CCIT can screen such privately published material nor can they ensure its accuracy or assume responsibility for its content. 5.5 Content Security. The school takes reasonable steps to promote and preserve the security of its IT systems, yet security can be breached through actions beyond the school s reasonable control. Therefore, the school cannot guarantee the absolute security of any user s content. Further, the school relies on users to employ reasonable means to protect their own security and thereby, that of the entire IT Systems environment. (See Section 4.) 5.6 Content Privacy. The school takes reasonable steps to promote and preserve the privacy of its IT systems, yet privacy can be breached through actions beyond the school s reasonable control. Further, while not a breach of privacy, but rather as part of their routine job duties, users should be aware that systems administrators may coincidentally come into contact with user s content or may even be required to analyze that content or its metadata to support IT system integrity. 5.7 IT System Logs. IT systems routinely log user actions in order to facilitate recovery from system malfunctions or for other appropriate IT system management purposes. Users should recognize that the extent of individually identifiable data collected in IT systems logs may vary. 5.8 Personal Identification. Upon request of a systems administrator or other school authority, users shall produce valid Mines identification (e.g. when requesting access to a secure IT system or area.) 6.0 ENFORCEMENT PROCEDURES & PENALTIES 6.1 Complaints of Alleged Violations. An individual who believes that he or she has been harmed by an alleged violation of this policy may file a complaint in accordance with established grievance procedures for students, faculty, and staff, including procedures for filing sexual harassment complaints, when relevant. The individual is also encouraged to report the alleged violation to the systems authority overseeing the facility most directly involved, or to the Chief Information Security Officer ( CISO ), or to the Chief Information Officer ( CIO ). 6.2 Reporting Observed Violations. An individual (including a CCIT employee) who believes that he or she has observed or otherwise is aware of a violation of this policy but has not been harmed by the alleged violation shall report the violation to the systems authority overseeing the facility most directly involved, or to the CISO, or to the CIO. Page 5 of 7
6 6.3 Disciplinary Procedures. Alleged violations of this policy will be pursued in accordance with the appropriate disciplinary procedures for faculty, staff, and students, as outlined in the Faculty Handbook, State Personnel Rules, Student Handbook Policies, and other applicable law and materials. CCIT will assist as required in these procedures. 6.4 Penalties. Violators of this policy may be subject to penalties provided by the applicable procedures and policies referenced in the preceding paragraph, as well as IT-specific penalties including temporary or permanent reduction or elimination of some or all IT privileges, and any penalties established by applicable law. The appropriate penalties shall be determined by the applicable disciplinary authority in consultation with the CIO. Further, the school, acting through an authorized systems administrator, may deactivate a user s IT privileges any time it deems deactivation necessary to preserve the integrity and/or safety of facilities, user services, data, or other assets. 6.5 Legal Liability for Unlawful Use. In addition to school discipline, users may be subject to criminal prosecution, civil liability, or both, for any unlawful use of any IT system. 6.6 Appeals. Users found in violation of this policy may use the appeals process defined in the relevant disciplinary procedure applied to the incident. 7.0 DEFINITIONS: 7.1 IT Systems: The computers, terminals, printers, network and other appliances, wiring infrastructure, telephone and telecommunications devices and software, online and offline data storage media and related equipment, owned or licensed software, applications, and data files owned, managed, or maintained by the school. These include institutional as well as departmental information systems, faculty research systems, desktop computers, Mines campus data and telecommunications networks, general access computer clusters, etc. 7.2 Malware: Any one of a variety of forms of hostile, intrusive, or annoying software or program code designed to infiltrate a computer system without the owner or user s intent. Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, crime-ware, most rootkits, and other malicious and unwanted software. Malware is not the same as defective software or software that has a legitimate purpose but contains harmful bugs. 7.3 User: A user is a person who makes use of any Mines IT system from any location, whether that use is authorized or not. For example, users include a person using an oncampus cluster computer as well as a person using his or her own personal computer offcampus but connected to a Mines IT system via network. Page 6 of 7
7 7.4 Systems Authority: Mines as the legal owner and operator of all of its IT systems, delegates oversight of particular systems to the head of a specific subdivision, department, or office of the school, or to an individual faculty member in particular cases including those IT systems purchased with research or other funds for which the faculty member is responsible. The individual with delegated oversight of an IT system is the System Authority and is responsible for all aspects of that system. 7.5 Systems Administrator: Systems Authorities often designate one or more persons as System Administrator(s) to manage the particular IT system(s) assigned to them. System Administrators oversee the day-to-day operation of the system including provision of authorized user credentials. 7.6 Certifying Authority: An employee of the school who has been given the authority to certify the appropriateness and accuracy of an official school document for electronic publication in the course of school business, such as the Director of Public Relations, Registrar, the Director of Institutional Research and/or other authorities who are responsible for publications. 7.7 Specific Authorization: Documented permission (e.g. an approved system access request form or other valid communication on file, or a valid Mines e-key) to use a specific IT System for a specific purpose granted by the systems authority, system owner, the CIO or the responsible Vice President in their respective area. 8.0 POLICY REVIEW: This policy may be periodically reviewed by the CIO who may consult with relevant school committees, faculty, students, and staff regarding changes that should be considered. Page 7 of 7
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
Acceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
OLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
JHSPH Acceptable Use Policy
1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing
Acceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
Hyde School Student Computer Systems Acceptable Use Policy
Hyde School Student Computer Systems Acceptable Use Policy A. Hyde School Computer Systems and Internet Access Please read the following carefully before signing this document. This is a legally binding
Policy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
SOUTH DAKOTA BOARD OF REGENTS. Policy Manual
SOUTH DAKOTA BOARD OF REGENTS Policy Manual SUBJECT: Acceptable Use of Information Technology Systems NUMBER: 7:1 1. Purpose The Board acquires, maintains and operates information technology systems to
Acceptable Use (Anti-Abuse) Policy
Acceptable Use (Anti-Abuse) Policy This document describes the Acceptable Use Policy for the Rightside registry. Copyright 2014 Rightside Registry Copyright 2014 Rightside Domains Europe Ltd. Rightside
Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES. 1. Definitions. In this regulation unless a contrary intention appears.
Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES 1. Definitions In this regulation unless a contrary intention appears Authority means (i) in relation to the central facilities and computing and
THE CITY UNIVERSITY OF NEW YORK POLICY ON ACCEPTABLE USE OF COMPUTER RESOURCES
THE CITY UNIVERSITY OF NEW YORK POLICY ON ACCEPTABLE USE OF COMPUTER RESOURCES I. INTRODUCTION CUNY s computer resources are dedicated to the support of the University s mission of education, research
Sample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11
Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Acceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
IT1. Acceptable Use of Information Technology Resources. Policies and Procedures
IT1 Policies and Procedures Acceptable Use of Information Technology Resources Originator: Information Technology Governance Committee Approver: President s Council Effective: October 16, 2007 Replaces:
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
FKCC AUP/LOCAL AUTHORITY
FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and
INTERNET ACCEPTABLE USE POLICY
INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods
BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
North Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
Riverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
Marist College. Information Security Policy
Marist College Information Security Policy February 2005 INTRODUCTION... 3 PURPOSE OF INFORMATION SECURITY POLICY... 3 INFORMATION SECURITY - DEFINITION... 4 APPLICABILITY... 4 ROLES AND RESPONSIBILITIES...
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4
Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User
AP 417 Information and Communication Services
AP 417 Information and Communication Services Background Access and use of information and communication services (ICS) are an integral component of the learning and working environment. The ability for
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network
Terms of Service. As of Julyl 1, 2014 IMPORTANT LEGALLY BINDING AGREEMENT
Terms of Service As of Julyl 1, 2014 IMPORTANT LEGALLY BINDING AGREEMENT Box, Inc. ( Box ) is making the Box Service (as defined below) available to you ( You or Your ) because You are a faculty member,
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the
Cablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
Acceptable Use and Security of UBC Electronic Information and Systems
The University of British Columbia Board of Governors Policy No.: 104 Approval Date: June 2013 Title: Responsible Executive: Vice-President, Academic and Provost Deputy Vice-Chancellor (UBC Okanagan) Acceptable
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
Computer, Communication, and Network Technology Acceptable Use
Policy V. 2.10.2 Responsible Official: Dean of University Libraries and Chief Information Officer Effective Date: April 12, 2010 Computer, Communication, and Network Technology Acceptable Use Policy Statement
EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
THE SCHOOL DISTRICT OF PHILADELPHIA
No. 815 SECTION: OPERATIONS THE SCHOOL DISTRICT OF PHILADELPHIA TITLE: ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES ADOPTED: March 15, 2012 REVISED: August 21, 2014 815. ACCEPTABLE USE OF
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
As of August 1 st, 2014 IMPORTANT LEGALLY BINDING AGREEMENT
As of August 1 st, 2014 IMPORTANT LEGALLY BINDING AGREEMENT Box, Inc. ( Box ) is making the Box Service (as defined below) available to you ( You or Your ) because You are a faculty member, staff member
TECHNOLOGY ACCEPTABLE USE POLICY
Policy Statement TECHNOLOGY ACCEPTABLE USE POLICY Reason for Policy/Purpose The purpose of this policy is to provide guidelines to the acceptable and ethical behavior that guides use of information and
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
RIVERVIEW SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK
Acceptable Use Policy
Acceptable Use Policy Department of Information Technology Olivet Nazarene University (815) 939-5302 Published August 2013 Ver. 4.0 Policy Overview 1. Executive Summary This summary is intended to present
