8.500 Information Technology Acceptable Use Policy

Policy Number: 8.500

Subject: Information Technology Acceptable Use

Original Adoption: September 22, 1999

Revised: August 2016

Next Scheduled Review: August 2018

Responsible Cabinet Member: Chief Information Officer

Department/Office: IT Department


BACKGROUND/HISTORY

The purpose of this policy is to establish parameters of acceptability for use of the National Park College computing facilities and resources by College faculty, staff, students and other NPC network users.

SCOPE

Computing resources (including, but not limited to, desktop computers, printers, computing facilities, the local area network, Wi-Fi, access to the Internet, electronic mail and similar electronic information) of National Park College are available only to authorized users, and any use of those resources is subject to these standards. These standards do not supersede or replace existing College policies, which will be applied as the situation warrants. All users of the College’s computing resources are presumed to have read and understood the following standards.

AUTHORITY

This section should include and may include reference to regulatory or legal reasons for the policy.

DEFINITIONS

This section should clearly define any special terms or concepts used in the policy.

A. General Responsibilities

The College’s information technology acceptable use standards require that each user (anyone using these resources):

  1. Accept responsibility for learning how to use information technology effectively and responsibly. The College provides training on the use of information technology. All users are encouraged to learn the proper use of information technology through individual learning or by attending training sessions or classes. Each user is responsible for checking computer software and data files he/she introduces to any computer on the college network for computer viruses. Each user accepts responsibility for backup and security of his or her own work. Each user should learn how to make backup copies of important work and learn and properly use software features for securing or sharing access to their information.
  2. Use resources efficiently. Accept limitations or restrictions on computing resources, such as storage space, time limits or amount of resources consumed, when so instructed by the College. Each e-mail user is responsible for managing his or her message storage. Such restrictions are designed to ensure fair access for all users.
  3. Abide by all security provisions. Distributing or making your password or another person's password or access code available to unauthorized persons or otherwise attempting to evade, disable or "crack" passwords or other security provisions, or assisting others in doing so threatens the work, privacy and well-being of others and is prohibited.
  4. Respect the rights of others to have freedom from harassment or intimidation. Sending abusive or unwanted material is a violation of College policies, may violate the law, and is prohibited. Targeting another person, group or organization to cause distress, embarrassment, injury, unwanted attention, or other substantial discomfort is harassment is prohibited. Personal attacks or other actions to threaten, intimidate or embarrass an individual, group or organization are prohibited. NPC will be the arbiter of what constitutes proper conduct, consistent with College policies.
  5. Recognize the College's right to access, review, and monitor the use of computing resources, including but not limited to equipment and usage, as well as the data that is stored or transmitted.
  6. Observe proper online etiquette. Online networks shall be used only as permitted by the College, only in accordance with applicable College policies, and only for lawful purposes. Any conduct that in the College's discretion restricts or inhibits others from using an online network or violates College policies or applicable law is not permitted. Users are prohibited from posting on or transmitting through any on-line network any unlawful, harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, profane, hateful, racially or ethnically demeaning or threatening or otherwise objectionable material of any kind, including without limitation, any material which encourages conduct that would constitute a criminal offense, give rise to civil liability or otherwise violate any applicable law or college policies. Use of any on-line network to send unsolicited advertising, promotional material or other forms of solicitation to others is prohibited, except as permitted by law and when not prohibited by College policies. Downloading and/or manipulation of, or the creation, sending, or forwarding of messages or other content which pertain to or act on behalf of organizations not part of the mission of National Park College (such as religious groups, fraternal, political, private or athletic organizations, etc.) is prohibited. The College reserves the right to restrict and/or interrupt communications through or by use of any College computers or information technology services, which the College believes to be harmful to the College or to others.
  7. College information technology resources may be used for lawful and permitted purposes only. Non-compliance with any of the provisions of these standards may subject the user to sanctions and/or criminal prosecution, as well as personal liability in a civil suit.

B. Prohibited Conduct

  1. Unauthorized attempts to monitor another user's password-protected data or electronic communication, or delete another user's password-protected data, electronic communications or software, without that person's permission.
  2. Installing or running on any system a program that is intended to or is likely to result in eventual damage to a file or computer system.
  3. Performing acts that would unfairly monopolize computing resources to the exclusion of other users.
  4. Use of computing resources for non-National Park College commercial purposes.
  5. Use of software, graphics, photographs, or any other tangible form of expression that would violate or infringe any copyright or similar legally recognized protection of intellectual property rights.
  6. Activities that would constitute a violation of any policy of National Park College’s Board of Trustees, including (but not limited to) the College’s non-discrimination policy and its policy against sexual harassment and sex discrimination.
  7. Intentionally transmitting, storing, or receiving data, or otherwise using computing resources in a manner that would constitute a violation of local, state or federal law, including (but not limited to) obscenity, defamation, threats, harassment, and theft.
  8. Attempting to gain unauthorized access to a remote (non-NPC) network or remote computer system.
  9. Exploiting any NPC computing resources system by attempting to prevent or circumvent access, or using unauthorized data protection schemes.
  10. Performing any act that would disrupt normal operations of computers, workstations, peripherals, or networks.
  11. Using computing resources in such a way as to wrongfully hide the identity of the user or pose as another person. 12. Installing any software on College computers without proper software licenses. Always abide by the terms of all software license agreements. Unauthorized copying of software is illegal and expressly prohibited.

RESPONSIBILITIES

All users of the College’s computing resources are responsible for reading and understanding this policy.

©