Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D



Similar documents
Revelstoke Board of Education Policy Manual

Caldwell Community College and Technical Institute

Caldwell Community College and Technical Institute

Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents

Information Technology Acceptable Use Policy

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY

Administrative Procedure 3720 Computer and Network Use

COMPUTER AND NETWORK USAGE POLICY

Warren Consolidated Schools Technology Acceptable Use & Internet Safety Guidelines

McGill-Toolen Catholic High School Technology Acceptable Use Policy

Forrestville Valley School District #221

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Human Resources Policy and Procedure Manual

Technology Department 1350 Main Street Cambria, CA 93428

- Do not leave open /network applications unattended. Log off of a computer when it is in an unsecured area and out of your sight.

RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy

COLLINS CONSULTING, Inc.

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

POLICY MANUAL. Purpose

Bates Technical College. Information Technology Acceptable Use Policy

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

MEDWAY PUBLIC SCHOOLS Medway, MA. Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan ACCEPTABLE USE POLICY

North Clackamas School District 12

Revised: 6-04, 8-09, 1-12 REGULATION #5420

POLICIES AND REGULATIONS Policy #78

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students

How To Use Your Cell Phone At Renaissance Academy Charter School

COMPUTER USE IN INSTRUCTION

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320

Niagara County Community College

2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6

LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN

All individuals with access to Twin Falls School District technology and computer networks will:

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

POLICY Adopted by Board of Education: 4/20/05

How To Use The Internet Safely

AP 417 Information and Communication Services

Clear Creek ISD CQ (REGULATION) Business and Support Services: Electronic Communications

Acceptable Use of Information Technology

ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE

City of Venice Information Technology Usage Policy

REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS

Riverside Community College District Policy No General Institution

Acceptable Use Policy

Internet Acceptable Use Policy

MSB Salesforce Acceptable Use Policy

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306)

ACCEPTABLE USE OF TECHNOLOGY

TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS

COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY

COMPUTER NETWORK FOR EDUCATION

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

Code of Virginia, 1950, as amended, Sections , :1, , , and

IT1. Acceptable Use of Information Technology Resources. Policies and Procedures

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures

Dauphin County Technical School

RESPONSIBLE USE PROCEDURE for INFORMATION, COMMUNICATION AND COLLABORATION TECHNOLOGIES

COMPUTER USE POLICY. 1.0 Purpose and Summary

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

BOARD OF EDUCATION Cherry Hill, New Jersey

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

Johnson Creek School District Parent/Student Information Packet

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

COMPUTER, NETWORK AND INTERNET USE POLICY

Transcription:

Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D 1. PURPOSE SWC owns and operates a variety of computing systems which are provided for the use of the Sisseton Wahpeton College faculty, staff, and students in support of the programs of the college and are to be used for education, research, academic development, and public service only. Commercial uses are specifically excluded. All faculty, staff, and students are responsible for seeing that these computing facilities are used in an effective, efficient, ethical, and lawful manner. This agreement establishes rules and prohibitions that define acceptable use of these systems. Unacceptable use is prohibited, and is grounds for loss of computing privileges as well as discipline or legal sanctions under Federal, State and local laws. 2. AUDIENCE AND AGREEMENT All users of SWC computing systems must read, understand and comply with the policies outlined in this document, as well as any additional guidelines established by the administrators of each system. Such guidelines will be reviewed by the SWC Board of Trustees and are subject to Board approval. BY USING ANY OF THESE SYSTEMS, USERS AGREE THAT THEY WILL COMPLY WITH THESE POLICIES. 3. RIGHTS These computer systems, facilities and accounts are owned and operated by SWC. SWC reserves all rights, including termination of service without notice to the computing resources it owns and operates. These procedures shall not be construed as a waiver of any rights of SWC, nor shall they conflict with applicable acts of law. Users have rights that may be protected by Federal, State and local laws. 4. PRIVILEGES Access and privileges on SWC computing systems are assigned and managed by the administrators of specific individual systems. Eligible individuals may become authorized users of a system and be granted appropriate access and privileges by following the approval steps prescribed for that system. Users may not, under any circumstances, transfer or confer these privileges to other individuals. Any account assigned to an individual shall not be used by others without

written permission form the systems administrator. The authorized user is responsible for the proper use of the system, including any password protection. 5. RESPONSIBILITIES The Internet account holder is held responsible for his/her actions and activity within his/her account. Unacceptable uses of the network will result in the suspension or revoking of these privileges. Some examples of unacceptable use are: A. Using the network for illegal activity, including violation of copyright or other contracts. B. Using the network for financial or commercial gain. C. Degrading or disrupting equipment, software or system performance. D. Vandalizing the data of another user. E. Wastefully using finite resources. F. Gaining unauthorized access to resources or entities. G. Invading the privacy of individuals. H. Using an account owned by another user. I. Posting personal communications without the original author's consent. J. Posting anonymous messages. K. Downloading, storing, or printing files or messages that are profane, obscene, or that use language or images that offends or tends to degrade others. 6. SECURITY Any user who finds a possible security lapse on any system is obligated to report it to the system administrators. The system must not be used until the system administrator had investigated the problem. Users are ultimately responsible for backup of their own data, although the IT Department will make provisions to archive certain accounts.

7. CONFIDENTIALLITY Programs and files are confidential unless they have been made available, with written permission, to other authorized individuals. SWC Administration and the Director of Technology, including those individuals which they may so designate, reserve the right to access all information stored on SWC computers, including logging of Internet access. When performing maintenance, every effort is made to insure the privacy of a user's files. However, if policy violations are discovered, they will be reported immediately to the appropriate supervisor. If a violation is reported to the SWC Administration of the Director of Technology further monitoring may be viewed as warranted. Furthermore, accounts that have been placed on a probationary status maybe periodically checked for ongoing violations. 8. SYSTEM USAGE Electronic communications facilities (such as e-mail) are for college related activities only. Fraudulent, harassing, or obscene messages and or materials are not to be sent or stored. Since the SWC e-mail service is web-based and maybe accessed from anywhere on the Internet it is acceptable for individuals to use this system for their personal e-mail. This is not a waiver of any rights or policies established by SWC. 9. COPYRIGHT Computer software is protected by copyright and is not to be copied from, into or by using campus computing facilities, except as permitted by law or by the contract with the owner of the copyright, and with the authorization of the Director of Technology. This means that such computer and microcomputer software may only be copied for archival purposes, if permitted by the copyright owner. The number of copies and distribution of copies may not be done in such a way that the number of simultaneous users in a department exceeds the number of original licenses allotted to that department by the Director of Technology based on the licenses owned by SWC. 10. VIOLATIONS An individual's computer use privileges may be suspended immediately upon the discovery of a possible violation of these policies. Such suspected violations will be confidentially reported to the appropriate supervisors. Violations of these policies will be dealt with in the same manner as violations of other college policies and may result in disciplinary review. Violations of some of the above policies may constitute a criminal offense and dismissal from SWC.

11. ADDITIONAL GUIDELINES System administrators will establish more detailed guidelines, as needed, for specific computer systems and networks. 12. LEGAL MANDATE The following is a statement regarding this system that is mandated, or may soon be mandated, by Federal and/or State law. This policy and procedure shall not be construed as a waiver of any rights of SWC. These systems have the ability to read your mail: your own account and the system administrator account. While reasonable attempts have been made to ensure the privacy of your accounts and e-mail, this is no guarantee that your accounts or your e- mail is private. When you first log in to a computer you will be asked to change your password, please remember or keep your password in a safe place. You are responsible for the content that is your roaming profile. Computer Log On: (Example: jdoe) Default Password: swcc Email Address: (Example: jdoe@swc.tc) Default Password: swcc *All letters should be in lower case for both of your computer log in and email.

I,, have read the SWC (PRINT CLEARLY) Network/Email/Internet Acceptable Use agreement, understand it, and agree to adhere to the principles and procedures detailed within. I understand and accept the conditions stated above, and agree to hold blameless, and release from any liability, the Sisseton Wahpeton College, the Sisseton Wahpeton Oyate, and its administrators and employees. Signed Date Sisseton Wahpeton College Employee Email: @swc.tc Sisseton Wahpeton Oyate Employee Email: @swst.us Temporary Employee Email: