Acceptable Use of Information Technology



Similar documents
MAINE COMMUNITY COLLEGE SYSTEM. SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

Information Technology Acceptable Use Policy

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.

INTERNET, AND COMPUTER USE POLICY.

Organizational Policy

Revelstoke Board of Education Policy Manual

COMPUTER, INTERNET, & USE POLICY

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Rules for the use of the IT facilities. Effective August 2015 Present

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

Guidelines Applicability Guidelines Statements Guidelines Administration Management Responsibility... 4

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Code of Virginia, 1950, as amended, Sections , :1, , , and

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

[Example] Social Media Acceptable Use Policy

(Internet) for students, staff and, if requested, members of the Board of Education. All computer

Chatham County Schools Network Acceptable Use Policy Agreement Policy and Forms 3225/7320

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Bates Technical College. Information Technology Acceptable Use Policy

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

Acceptable Use Policy

DIOCESE OF DALLAS. Computer Internet Policy

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy

IT1. Acceptable Use of Information Technology Resources. Policies and Procedures

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

North Clackamas School District 12

Internet Use Policy and Code of Conduct

Dene Community School of Technology Staff Acceptable Use Policy

Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy

Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY

INTERNET ACCEPTABLE USE POLICY

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

Human Resources Policy and Procedure Manual

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Acceptable Use Policy

CT Communications Internet Handbook

DIGITAL TECHNOLOGY POLICY St Example s School

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

Niagara County Community College

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320

COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) USE OF COMPUTERS, COMPUTER NETWORKS, AND INTERNET SERVICES POLICY

8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you.

USE OF INFORMATION TECHNOLOGY FACILITIES

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low

Internet Acceptable Use Policy

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.

By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224

SOCIAL MEDIA POLICY. Introduction

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306)

POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6

Online Communication Services - TAFE NSW Code of Expected User Behaviour

BRIGHAM AND WOMEN S HOSPITAL

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

Social Media Policy. Policies and Procedures. Social Media Policy

Clear Creek ISD CQ (REGULATION) Business and Support Services: Electronic Communications

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests

ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

INFORMATION SYSTEM GENERAL USAGE POLICY

TECHNOLOGY ACCEPTABLE USE POLICY

13. Acceptable Use Policy

Conditions of Use. Communications and IT Facilities

HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications

YU General Guidelines for Use of Social Media

Virginia Commonwealth University Police Department

Caldwell Community College and Technical Institute

Delaware State University Policy

Acceptable Use Policy - NBN Services

Transcription:

Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible: Information Technology Services Current Approved Date: 2009 May 20 Statement The Institute provides information processing facilities to BCIT users to support the teaching, learning, research and administrative goals of the Institute. These resources are valuable community assets to be used and managed responsibly to ensure their integrity, security, and availability for educational and business activities. This policy applies to all Institute information and computing, communications, and networking resources connected to Institute facilities and the users of these resources. Purpose of This BCIT s information, network, and other information technology (IT) services are shared resources that are critical to teaching, learning, research, Institute operations, and service delivery. The purpose of this policy is to: Establish responsibilities regarding acceptable use of information technology for all BCIT users. Ensure the safe and respectful use of BCIT s information technology for all BCIT users. Directory of Records Classification 0650 10 1 of 9 3501 Acceptable Use.docm

Table of Contents Statement 1 Purpose of This 1 Application of This 2 Related Documents and Legislation 2 Definitions 3 Consequences of Violation 4 Duties and Responsibilities 5 1. Responsibilities by Role 5 2. General Accountability 6 3. Access 6 4. Copyright 6 5. Usage Monitoring 6 6. Connecting Equipment to the BCIT Network 6 7. Use of Institute Information on Non Institute Equipment 6 8. Off Campus Use of Institute Equipment 6 9. Personal Information Collection and Use 6 10. Software 7 11. Records 7 12. Personal Use 7 13. Commercial Use 7 14. Harassment 7 15. Inappropriate Material 8 16. Responsible Use of Assets 8 17. Use of Email for Official Communications 8 18. Use of Voicemail 8 Procedures and Guidelines Associated With This 8 Forms Associated With This 8 Special Situations 8 Amendment History 9 Scheduled Review Date 9 Application of This This policy applies to everyone who accesses BCIT s information technology. This includes those who use their own personal equipment to connect to Institute information assets. Related Documents and Legislation BCIT Policies: 1504, Standards of Conduct and Conflict of Interest 3502, Information Security 5102, Standards of Non academic Conduct 6700, Freedom of Information and Protection of Privacy (FOIPOP) 6701, Records Management 7506, Copyright Compliance 7507, Harassment and Discrimination 7511, Employment and Educational Equity 7522, Response to Abusive or Threatening Behaviour 7525, Protection of Equipment, Property and Information 7530, Emergency Response. Directory of Records Classification 0650 10 2 of 9 3501 Acceptable Use.docm

Legislation applicable to this policy includes: BC College and Institute Act BC Freedom of Information and Protection of Privacy (FOIPOP) Act BC Personal Information Protection (PIP) Act BC Human Rights Code The Criminal Code of Canada Canada Copyright Act. Definitions BCIT Internal Use: information that is available to authorized users and is not routinely disclosed. By default, data is BCIT Internal Use until it is assessed and otherwise classified. Blog: short for web log, is comparable to an online journal that allows users to post thoughts, ideas, or news items. Confidential Information: information that contains sensitive Institute information and is available to authorized users. A formal FOIPOP request is required for non routine disclosure. Defamation: a communicated statement found to be false and that causes harm to someone s reputation. Directory of Records: see 6701, Records Management. E communications: the use of electronic technologies to communicate including email systems, chat rooms, news groups, blogs, social software, and voice communication systems. Information Asset: an asset that is comprised of information or of equipment or systems for the processing of information. Information Processing Facilities: any information processing system, service, or infrastructure, or the physical locations housing them. This includes computer labs, classroom technologies, computing and electronic communication devices, and services such as modems, email, networks, and telephones. Instant Messaging: a form of real time communication between two or more people based on typed text. Non Institute Information: information that is created and maintained by an individual for the purposes of that individual. Non institute information, by definition, is not classified as Personal or Confidential by the Institute, although non Institute information may be considered personal or confidential by the owner. Personal Information: information that contains sensitive personal information and is available to authorized users only. A formal FOIPOP request is required for non routine disclosure. Services: include email, file storage, portals, web page hosting and other web services, and other services. Social Software: software whose primary purpose is to facilitate communication amongst individuals and groups who share a common interest. Social software includes, but is not limited to: blogs, wikis, personal networking services (e.g., MySpace, Facebook), file sharing services (e.g., Flickr), and synchronous and asynchronous chat and instant messaging tools (e.g., Skype, on line discussion forums, etc.). Directory of Records Classification 0650 10 3 of 9 3501 Acceptable Use.docm

User: a person who performs any action on an information asset. Wiki: a web based application that allows visitors to add, remove, and edit a public website without the need for registration. The ease of interaction and operation makes a wiki an effective tool for mass collaborative authoring. Consequences of Violation The Institute reserves the right to terminate or restrict the access privileges of a user whose activities negatively affect or pose a threat to a facility, another account holder, normal operations, or the reputation of the Institute. Following due process, the Institute may take one or more of the following actions against any user whose activities are in violation of this policy or the law: A verbal and written warning Restrictions or removal of access to any or all Institute computing facilities and services Legal action that could result in criminal or civil proceedings In the case of students, disciplinary action under 5102, Standards of Non academic Conduct. In the case of employees, disciplinary action up to and including termination. Equipment that violates BCIT policy or negatively affects or poses a threat to a facility, normal operations, or the reputation of the Institute may be immediately disconnected, quarantined, or otherwise contained. Institute owned equipment may also be seized. Directory of Records Classification 0650 10 4 of 9 3501 Acceptable Use.docm

Duties and Responsibilities 1. Responsibilities by Role Board of Governors and BCIT Executive The BCIT Board of Governors and the BCIT Executive actively support and promote the acceptable use of information technology. Information Security Officer The Information Security Officer is responsible for investigating violations of this policy. BCIT Management Members of BCIT Management are responsible for ensuring that employees and others under their supervision are aware of their acceptable use of information technology responsibilities. Instructors and Teaching Faculty Instructors and Teaching Faculty are responsible for ensuring that students under their supervision are aware of their acceptable use of information technology responsibilities. IT Administrators IT Administrators and other privileged users must protect the security of the information and must not abuse their elevated privileges. System Owners System Owners must ensure that all users have been made aware of this policy and 3502, Information Security, prior to granting access. Safety and Security The Safety and Security Department is responsible for monitoring the Institute s physical environment to ensure unacceptable behaviour is minimized. Risk Management The Risk Management group is responsible for monitoring liability risk from defamation and harassment. Users All users are responsible for: Familiarizing themselves with their responsibilities Complying with 3502, Information Security and other related Institute polices Complying with all the acceptable use of information technology requirements defined in this document Promptly reporting all acts that may constitute real or suspected breaches of acceptable use of information technology. Directory of Records Classification 0650 10 5 of 9 3501 Acceptable Use.docm

Duties and Responsibilities 2. General Accountability By using Institute information processing facilities, users accept the terms of this policy and 3502, Information Security. 3. Access See 3502, Information Security. 4. Copyright All electronic data including software, music, video, and audio media that are transmitted or stored on Institute information processing facilities are subject to 7506, Copyright Compliance and the Canada Copyright Act. Users may be required to obtain permission from the copyright owners for the digitizing, storing, sharing, and transmission of copyright protected materials. Users must not use BCIT s information processing facilities to receive, store, share, or send any unauthorized materials. 5. Usage Monitoring The Institute regularly monitors its assets, and all non Institute information transferred or stored on Institute assets may be reviewed as a result of this routine monitoring activity, and therefore users should have no expectation of privacy regarding any Institute or non Institute information stored on or transmitted using Institute assets. Students using computer lab facilities during scheduled class time may be subject to monitoring at the instructor s discretion. Use of computer lab facilities at any time is subject to the routine monitoring activities. 6. Connecting Equipment to the BCIT Network When connecting equipment to the BCIT network, users are responsible for adhering to this policy and 3502, Information Security. Non compliance may result in immediate disconnection from the network. Connection of non Institute computer equipment to Institute information processing facilities is subject to 3502, Information Security. All equipment connected to the network is governed by Institute policies and may be monitored for compliance. 7. Use of Institute Information on Non Institute Equipment If an employee, student or external party stores, processes or accesses Personal, Confidential or BCIT Internal Use information on non Institute equipment, the user and the equipment must comply with this policy and 3502, Information Security. 8. Off Campus Use of Institute Equipment Authorized users of off campus Institute owned equipment are bound by this policy and 3502, Information Security. 9. Personal Information Collection and Use The collection, use, storage, and transmission of personal information are governed by 6700, Freedom of Information and Protection of Privacy (FOIPOP) and 3502, Information Security. Directory of Records Classification 0650 10 6 of 9 3501 Acceptable Use.docm

Duties and Responsibilities Users are required to contact the Records Management and Privacy Office prior to collection of personal information. 10. Software All software installed on Institute owned assets must be properly licensed. Users are prohibited from using Institute information processing facilities to download, store, use, or distribute unlicensed software. 11. Records When using Institute information assets, employees and external parties who provide services are responsible for identifying BCIT official records and submitting those records to the designated repository according to the Directory of Records as detailed in 6701, Records Management. 12. Personal Use BCIT s information technology assets are intended for approved Institute purposes (including educational, academic, administrative, and research). All users shall minimize incidental personal use of Institute assets. Such personal use must not increase the Institute s costs, expose the Institute to additional risk, damage the Institute s reputation, or result in personal profit. BCIT assumes no responsibility for personal e communications using Institute assets. Users must not misrepresent personal e communications as official Institute e communications. Privately owned software and non Institute information is solely the responsibility of the user and will not be migrated when new computer systems are deployed. Any issues resulting from the use of privately owned software installed on an Institute asset will result in removal of the software. The Institute reserves the right to remove non Institute information from storage without warning or terminate or otherwise limit the transmission of non Institute information without warning if the storage or transmission interferes with normal operations. 13. Commercial Use All use of Institute assets for any business or commercial purposes must be authorized by the Institute. 14. Harassment BCIT is committed to providing a learning environment where individual differences of all students and employees are valued and respected as per 7507, Harassment and Discrimination. Users must not send harassing, offensive, threatening, defamatory, or obscene material by e communications using Institute assets, except in making a complaint. Directory of Records Classification 0650 10 7 of 9 3501 Acceptable Use.docm

Duties and Responsibilities 15. Inappropriate Material All users are prohibited from downloading, displaying, or distributing sexually explicit or violent images, video, or audio recordings. Users shall not initiate or respond to unsolicited communication containing sexual or violent content. This provision does not apply to the residence zone. 16. Responsible Use of Assets Users must not deliberately degrade Institute information processing facilities or deny service to others through any actions including excessive consumption or locking of resources including disk space, network bandwidth, and printing and processing capacity. Users have an obligation to inform system owners of their capacity requirements. 17. Use of Email for Official Communications Email is an official communication mechanism of the Institute. All users must adhere to Guideline 3501, Acceptable Use of Information Technology regarding the use of email. Users are responsible for ensuring that they can review official Institute emails in a timely manner. This includes account monitoring, management of storage space, and ensuring mail is flowing to any forwarded address. 18. Use of Voicemail The BCIT voicemail system is for Institute business only. Greetings and messages must not convey or promote an employee's personal interest or private business. Each employee s voicemail message must follow Guideline 3501, Acceptable Use of Information Technology. Employees are responsible for managing their voicemail messages effectively. See Guideline 3501, Acceptable Use of Information Technology for details. Procedures and Guidelines Associated With This Guideline 3501, Acceptable Use of Information Technology. Forms Associated With This See Guideline 3501, Acceptable Use of Information Technology. Special Situations None. Directory of Records Classification 0650 10 8 of 9 3501 Acceptable Use.docm

Amendment History 1. 1997 Dec 01 2. 2002 Jul 01 3. 2003 Aug 01 4. 2006 Aug 31 5. 2009 May 20 Scheduled Review Date 2014 May 01 Directory of Records Classification 0650 10 9 of 9 3501 Acceptable Use.docm