Coppin State University Title: CSU Faculty/Staff Computer Use and Internet Access Policy

Similar documents
POLICY MANUAL. Purpose

Administrative Procedure 3720 Computer and Network Use

IT and Network Usage Policy of International Islamic University, Islamabad

COMPUTER USE POLICY. 1.0 Purpose and Summary

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

Riverside Community College District Policy No General Institution

Bates Technical College. Information Technology Acceptable Use Policy

MEDWAY PUBLIC SCHOOLS Medway, MA. Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12

Responsible Use of Technology and Information Resources

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, ,

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.

RESPONSIBLE COMPUTER USE POLICY (ADOPTED AUGUST 3, 2006)

City of Grand Rapids ADMINISTRATIVE POLICY

Park Avenue motor cars

Appendix I. The City University of New York Policy on Acceptable Use of Computer Resources

Dauphin County Technical School

COMPUTER NETWORK AGREEMENT FORM

How To Use Your Cell Phone At Renaissance Academy Charter School

ACCEPTABLE USE OF TECHNOLOGY

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

region16.net Acceptable Use Policy ( AUP )

COMPUTER USE IN INSTRUCTION

Policy for the Acceptable Use of Information Technology Resources

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy

SOUTH DAKOTA BOARD OF REGENTS. Policy Manual

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320

Forrestville Valley School District #221

Acceptable Use and Security of UBC Electronic Information and Systems

Information Technology Acceptable Use Policy

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

Internet Acceptable Use Policy

Information Security and Electronic Communications Acceptable Use Policy (AUP)

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan ACCEPTABLE USE POLICY

City of Venice Information Technology Usage Policy

COMPUTER NETWORK FOR EDUCATION

Revised: 6-04, 8-09, 1-12 REGULATION #5420

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

Approved by the Board of Trustees, Certification No. 72 ( )

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures

DIOCESE OF DALLAS. Computer Internet Policy

Covered California. Terms and Conditions of Use

Information Technology Network/ /Internet Acceptable Use Agreement Form IT-D

COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY

By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

VATSIM USER AGREEMENT

Chatham County Schools Network Acceptable Use Policy Agreement Policy and Forms 3225/7320

3. Fee. You are entitled to use the Equipment without cost so long as you abide by the terms and conditions of this Agreement.

Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY

B. Terms of Agreement; Google Terms of Service; Conflicting Provisions

DRAFT - NMHU POLICIES CONCERNING COMPUTER, NETWORK, AND

RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois

North Clackamas School District 12

USE OF INFORMATION TECHNOLOGY FACILITIES

Computer and Network Use Administrative Procedure AP 3720

Acceptable Use Policy

RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES

Roseville Public Library Computer and Internet Use Policy

TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

TERMS OF USE & SERVICE

Human Resources Policy and Procedure Manual

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

Use of ESF Computing and Network Resources

To report an incident of policy abuse please send detailed to:

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

Computing Privileges. Policy: Scope. Policy

COLLINS CONSULTING, Inc.

University Policy Acceptable Use of Information Technology Resources

Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007

GOSFIELD NORTH COMMUNICATIONS CO-OPERATIVE LIMITED ( GOSFIELD ) ACCEPTABLE USE POLICY

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

OLYMPIC COLLEGE POLICY

Franciscan University of Steubenville Information Security Policy

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

BOBCAT COMPUTING POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

Purposeful Use Of A CCCC Computing System

State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.

Contra Costa Community College District Business Procedure ACCEPTABLE TECHNOLOGY USE

Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website

ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Introduction. General Use

Texas University Law - General Use of Technology Resources

InnoCaption TM Service Terms of Use

Lutheran Education Association of Houston Acceptable Use Policy (Students)

Acceptable Use of Information Technology (IT) Resources

Grand Rapids Public Schools

Electronic Communications System

DATA ACCESS POLICY. Attached is a policy statement regarding data access at the New Jersey Institute of Technology.

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014

AP 417 Information and Communication Services

Website & Hosting Terms & Conditions

POLICY Adopted by Board of Education: 4/20/05

Transcription:

1.0 PURPOSE To establish a policy to ensure the proper use of Coppin State University s computer and network resources and services by its employees, students, independent contractors and other computer users. All computer and network users have the responsibility to use these resources in an efficient, effective, ethical and lawful manner. The following policy, rules and conditions apply to all users of computer and network resources and services, including Internet resources, wherever the users are located. It applies to all computer and Internet communication facilities owned, leased, operated or contracted by CSU. It is intended to encompass and conform to the Internet Access and Security Policy Guidelines of the State of Maryland ( State ). Violations of this policy may result in disciplinary action, including possible suspension, termination, and/or legal action. More specific policies relating to student use are addressed in a separate document. Violations will be forwarded to the Office of Human Resources, for staff, or the Office of the Provost, for faculty, and will be adjudicated in accordance with the current procedures. Violations may result in revocation of computing resource privileges, faculty/staff disciplinary action or legal action. 2.0 INTRODUCTION Coppin State University has the right, but not the duty, to monitor any and all aspects of the computer system, including employee or student e-mail, to ensure compliance with this policy. The computers and computer accounts given to employees and students are to assist them in the performance of their jobs or the furtherance of their studies. Employees and students should not have an expectation of privacy in anything they create, send, or receive on the computer. The computer and network systems belong to Coppin State University and may be used for business or educational purposes only. 2.1 External Conditions of Use Where use of external networks is involved, policies governing such use also are applicable and must be adhered to. 3.0 EQUIPMENT Computer users are governed by the following provisions, which apply to all use of computer and telecommunication resources and services. Computers and network resources and services include, but are not limited to the following: host computers, servers, workstations, 1

standalone computers, laptops, software, printers, and internal or external communications networks (Internet, commercial online services, bulletin board systems, and e-mail systems) that are accessed directly or indirectly from Coppin State University s computer facilities. 4.0 REVISIONS This policy may be amended or revised periodically as the need arises. 5.0 RESPONSIBILITIES OF USERS Access to the CSU network and to Internet resources infrastructure both within and beyond CSU campus, sharing of information, and security of the intellectual products of the community all require that each and every user accept responsibility to protect the rights of the community. The term users, as used in this policy, refers to all employees, independent contractors, students and other persons or entities accessing or using Coppin State University s computer and telecommunications resources and services. Coppin State University is not responsible for the actions of individual users. 5.1 Copyrights and Licenses Users must comply with all software licenses, copyrights and all other state and federal laws governing intellectual property. Users may not install software onto the network without first receiving express authorization to do so from the Vice President of the Information Technology Division. a) Copying - All software protected by copyright must not be copied except as specifically stipulated by the owner of the copyright or otherwise permitted by copyright law. Protected software may not be copied into, from, or by any CSU facility or system, except pursuant to a valid license or as otherwise permitted by copyright law. b) Number of Simultaneous Use - The number and distribution of copies must be handled in such a way that the number of simultaneous users does not exceed the number of original copies purchased by that department, unless otherwise stipulated in the purchase contract. c) Copyrights - In addition to software, all other copyrighted information (text, images, icons, programs, etc.) retrieved from computer or network resources must be used in conformance with applicable copyright and other law. Copied material must be properly attributed. Plagiarism of computer information is subject to the same sanctions as apply to plagiarism in any other media 5.2 Integrity of Information Resources 2

Computers users must respect the integrity of computer-based information resources. a) Modification or Removal of Equipment -- Computers users must not attempt to modify or remove computer equipment, software, or peripherals that are owned by others without proper authorization. b) Encroaching on Others' Access and Use - Computer users must not encroach on others' access and use of CSU s computers. This includes but is not limited to: the sending of chain-letters or excessive messages, either locally or off-campus; printing excess copies of documents, files, data, or programs; running grossly inefficient programs when efficient alternatives are known by the user to be available; unauthorized modification for system facilities, operating systems, or disk partitions; attempting to crash or tie up a CSU computer or network; and damaging or vandalizing CSU computing facilities, equipment, software, or computer files. c) Unauthorized or Destructive Programs - Computer users must not intentionally develop or use programs which disrupt other computer users or which access private or restricted portions of the system and/or damage the software or hardware components of the system. Computer users must use great care to ensure they do not use programs or utilities which interfere with other computer users or which modify normally protected or restricted portions of the system or user accounts. Computer users must not use network links for any use other than permitted in network guidelines. The use of any authorized or destructive program may result in legal civil action for damages or other punitive action by any injured party, including the CSU, as well as criminal action. 5.3 Unauthorized Access A user s ability to connect to other computer systems throughout the network does not imply a right to connect to those systems or to make use of those systems unless specifically authorized by the operators of those systems. Computer users must refrain from seeking to gain unauthorized access to information resources or enabling unauthorized access. a) Abuse of Computing Privileges - Users of CSU information resources must not access computers, computer software, computer data or information, or networks without proper authorization, or intentionally enable others to do so, regardless of whether computer, software, data, information, or network in question is owned by CSU. For example, abuse of the networks to which CSU belongs or the computers at other sites connected to those networks will be treated as an abuse of CSU computer privileges. b) Reporting Problems - Any defects discovered in system accounting or system security must be reported to the Information Technology Division so that steps can be taken to 3

investigate and solve the problem. c) Password Protection - Users are responsible for safeguarding their passwords for the system. Individual passwords should not be printed, stored online, or given to others. Users are responsible for all transactions made using their passwords. A computer user who has been authorized to use a password-protected account may be subject to both civil and criminally liability if the user discloses the password or otherwise makes the account available to others without permission of the Vice President of the Information Technology Division. 5.4 Privacy Most STATE systems provide mechanism for the protection of private information from examination by others. Attempts to circumvent these mechanisms in order to gain unauthorized access to the system or to private information are a violation of CSU policy and may violate applicable law. Authorized system administrators may access computer users' files at any time for maintenance purposes. System administrators will report suspected unlawful or improper activities to the proper authorities. a) Unlawful Messages - Use of electronic communication facilities (such as mail or talk, or systems with similar functions) to send fraudulent, harassing, obscene, threatening or other messages that are a violation of applicable federal, state, or other law or STATE or CSU policy is prohibited. Users encountering or receiving such material should immediately report the incident to their supervisor. b) Mailing Lists - Users must respect the purpose and charters of computer mailing lists (including local network newsgroups and bulletin-boards). The user of an electronic mailing list is responsible for determining the purpose of the list before sending messages to or receiving messages from the list. Subscribers to an electronic mailing list will be viewed as having solicited any material delivered by the list as long as that material is consistent with the list's purpose. Persons sending to a mailing list any materials which are not consistent with the list's purpose will be viewed as having sent unsolicited material. c) Advertisements - In general, CSU s electronic communication facilities should not be used to transmit commercial or personal advertisements, solicitations or promotions (See Commercial Use, below). Some public bulletin boards have been designated for selling items, etc., and may be used appropriately, according to the stated purpose of the list(s). Vendors may send product information and technical material to specific mailing lists, with the permission of the manager of the mailing lists. d) Information belonging to others - users must not intentionally seek or provide information on, obtain copies of, or modify data files, programs, or passwords belonging to other users without the permission of those users. 4

e) Confidentiality - CSU does not exist in isolation from other communities and jurisdictions and their laws. Under circumstances, as a result of investigations, subpoena or lawsuits, individual users or CSU may be required by law to provide electronic or other records or information related to those records or relating to use of information resources. 5.5 Political, Personal and Commercial Use a) Political use - CSU information resources must not be used for partisan political activities where prohibited by federal, states or other applicable laws, and may be used for other political activities only when in compliance with federal, state and other laws and in compliance with applicable STATE and CSU policies. b) Personal Use - CSU information resources should not be used for personal activities not related to appropriate CSU functions, except in an incidental manner. c) Commercial use - CSU information resources should not be used for commercial purposes except in a purely incidental manner or as permitted under other written policies of CSU or with the written approval of a CSU officer having the authority to give such approval. Any such commercial use should be properly related to CSU activities, take into account proper cost allocations for government and other overhead determinations and provide cost allocations for government and other overhead determinations and provide for appropriate reimbursement to CSU for taxes and other costs CSU may incur by reason of the commercial use. 6.0 INERNET ACCESS AND USE The Internet is a powerful medium for information dissemination and gathering. Because of the immense variety of information accessible from anywhere in the world, and the freedom of speech supported by the internet, CSU, as owner of the CSU server, must determine guideline for appropriate content and format that meet its standards of professionalism. Adherence to these guidelines is prerequisite to continued use of the CSU server. 5

6.1 Internet Access Account Terms and Conditions CSU requires that users having Internet connectivity access will adhere to the following guidelines: all account requests must be presented through the Information Technology Division; all CSU regulations must be followed; any information on Class or Program Descriptions must reflect the University Catalog; When possible, all references to these areas should use the catalog available electronically on the server. Contact the network administrator for information on its location. If changes or updates are being posted, that information must be clearly labeled; no pornographic/obscene material will be displayed or linked directly; no copyrighted materials may be displayed without the written authorization form the holder of the copyright; confidentiality of student information, including grades, schedules, and other personal data, must be maintained; information on personal pages that does not reflect official CSU policy must be labeled to indicate such; CSU reserves the right to monitor all Internet activities and transactions. CSU may revoke Internet privileges at any time for abuse of resources or direct conflict with any stated policy, Internet or otherwise. 6.2 E-mail and Internet Etiquette Guidelines a) Users should use the same care in drafting e-mail and other electronic documents as they would for any other written communication. Anything created on the computer may, and likely will, be reviewed by others. b) Users shall not forward e-mail which is marked as private or confidential to any other person or entity without the express permission of the sender. E-mail which is not designated by the sender as private or confidential shall be deemed eligible to share. c) Users should not alter or copy a file belonging to another user without first obtaining permission from the owner of the file. The ability to read, alter, or copy a file belonging to another user does not imply permission to read, alter, or copy that file. 6

6.3 Creation and Maintenance of World Wide Web (WWW) Pages All WWW pages created for departments or organizations within CSU and placed on the Web Server are considered an official representation of CSU and thus must be in compliance with the stated mission and standards for CSU. These official pages must be approved by the responsible manager and Vice President (or designee) and the Publications Office. CSU will provide access to an area on its servers where faculty, staff as well as CSU students can publish their own personal WWW pages. Web pages published by the faculty, staff and students in this personal area will not be reviewed by CSU staff and does not represent an official University communication. The content of those WWW pages are the sole responsibility of their publishers. CSU shall not be responsible for the material or opinions expressed in these homepages. The publishers of those individual personal homepages shall display the following disclaimer on each Web Page: This Web page has been created by individual faculty, staff or students. Coppin State University ( CSU ) makes absolutely no guarantee as to the currency, accuracy, or quality of information published and/or archived; nor will CSU accept any responsibility for other organizations, businesses or private persons who provide information on the CSU system. The views and opinions expressed on this page or any links made available are strictly those of the Web Page author and do not necessarily state or reflect those of CSU. The contents of these pages have not been reviewed or approved by Coppin State University. 7.0 CSU SOFTWARE COMPLIANCE The State of Maryland has established requirements that all State Agencies comply with its policy and procedures for the prevention of software copyright infringement. More specifically, Policy Number 95-1 of the Maryland State Department of Budget Management, Prevention of Software Copyright Infringement, is specifically incorporated herein by reference. The specific policy statement is included in Section 6.1 below. Coppin State University, as an Agency of the State of Maryland, must implement the State software policy for copyright infringement. The Information Technology Division will not install any software unless its staff can verify the existence of a valid license. 8. User Signature Each user shall countersign to acknowledge receipt and agree to comply with the foregoing policy, rules and conditions governing the use of Coppin State University s computer and telecommunications resources and services and that they understand that violation of this policy may result in disciplinary action, including possible suspension, termination, and/or legal action. 7