Policies

Intergrated Information Technology Services



Responsible Use of College Computing Resources




POLICY: 
 
As part of its educational mission, Utica College acquires and maintains fixed and mobile computers, computer systems, mobile phones, smartphone devices, and related networks (collectively referred to as “computing resources”). These computing resources are intended to be used for College-related purposes, including direct and indirect support of College instruction, research, and service; College operations and administrative functions; student and campus life activities; and the free exchange of ideas among members of the College community and between the College community and local, regional, national, and global communities.
 
The rights, responsibilities, and limitations of academic freedom apply to the use of College computing resources. The use of College computing resources, like the use of any other College-provided assets, property, or services, is subject to the requirements and standards of legal and ethical behavior, as they evolve over time, within the College community. Legitimate use of a computer, computer system, phone device, or network does not extend to whatever is technically possible. Limitations built into computer operating systems and networks are not the sole restrictions on what is permissible. Users must abide by all applicable restrictions, whether or not they are built into the operating system or network and whether or not they can be circumvented by technical means.
 
All users of College computing resources must:
 
  • Comply with all federal, New York, and other applicable laws, including the laws of jurisdictions other than New York from which a user obtains access to College computing resources, all applicable College rules and policies, and all applicable contracts and licenses between the College and a third party relating to College computing resources. Such laws, rules, and policies include, but are not limited to, the following: libel, defamation, privacy, copyright, trademark, obscenity, and child pornography laws; the Electronic Communications Privacy Act and the Computer Fraud and Abuse Act, which prohibit hacking and similar activities; the Digital Millennium Copyright Act governing, among other things, digital rights management and certain copyright infringement within and outside the United States; the Higher Education Opportunity Act, which mandates that higher education institutions develop and implement a written plan to effectively combat unauthorized distribution of copyrighted materials by users of the institution’s network; the College’s student and employee handbooks; and the College’s Peer-to-Peer File-Sharing, Sexual Harassment, And Employee Code of Conduct policies. Users who engage in electronic communications with persons in other states or countries or on other systems or networks should be aware that they may also be subject to the laws of those other states and countries and the rules and policies of those other systems and networks, and may be exposed to viruses and other network-disrupting software or programs. Users are responsible for ascertaining, understanding, and complying with the laws, rules, policies, contracts, and licenses applicable to their particular uses.
  • Use only those computing resources that they are authorized to use and use them only in the manner and to the extent authorized. Ability to access computing resources does not per se imply authorization to do so. Users are responsible for ascertaining what authorizations are necessary and for obtaining them before proceeding. Accounts and passwords may not, under any circumstances, be shared with, or used by, persons other than those to whom they have been assigned by the College. For more information, see the College’s Computer Passwords and Purchasing policies.
  • Respect the privacy of other users and their accounts, regardless of whether those accounts are securely protected. Again, ability to access other persons’ accounts does not, by itself, imply authorization to do so. Users are responsible for ascertaining what authorizations are necessary and for obtaining them before proceeding.
  • Limit bandwidth use so as not to consume an unreasonable amount of resources or to interfere unreasonably with the activity of other users. While bandwidth is generally assumed to be infinite, it is not. Although no specific limits have been established for bandwidth, disk space, CPU time, or other applications on or uses of College computing resources, the College may require users of those resources to limit or refrain from specific uses, as determined by the Office of Integrated Information Technology Services, taking into account relevant facts and circumstances.
  • Refrain from using computing resources for personal commercial purposes or for personal financial or other gain. Personal use of College computing resources for other purposes is permitted only when it is incidental, does not consume a significant amount of those resources, does not interfere with the performance of the user’s job or other College responsibilities, and is otherwise in compliance with this policy. Further limits may be imposed by the Office of Integrated Information Technology Services from time to time upon personal use in accordance with normal supervisory procedures.Refrain from using College trademarks and logos without authorization to do so. Authorization to use College trademarks and logos may be granted only by the Office of Marketing and Communications. For more information, see the College’s Posting policy.
 Google Apps Acceptable Use Policy
In addition to the above rules, the College’s use of Google Services requires each user to abide by the Google Apps Acceptable Use Policy, which states, in part, that:
 
You agree not to, and not to allow third parties or your end users to, use the Services:
  • to generate or facilitate unsolicited bulk commercial email;
  • to violate, or encourage the violation of, the legal rights of others;
  • for any unlawful, invasive, infringing, defamatory, or fraudulent purpose;
  • to intentionally distribute viruses, worms, Trojan horses, corrupted files, hoaxes, or other items of a destructive or deceptive nature;
  • to interfere with the use of the Services, or the equipment used to provide the Services, by customers, authorized resellers, or other authorized users;
  • to alter, disable, interfere with, or circumvent any aspect of the Services;
  • to test or reverse-engineer the Services in order to find limitations, vulnerabilities or evade filtering capabilities; 
Your failure to comply with the foregoing may result in suspension or termination, or both, of your right to use Google Services. 
 
A full copy of the Google Apps Acceptable Use policy is available at:
 
http://www.google.com/apps/intl/en/terms/education_terms.html
 
SCOPE: 
 
This policy applies to all users of College computing resources, whether affiliated with the College or not, and to all uses of those resources, whether on campus or from remote locations.
 
This policy also applies to all forms of social media, such as Facebook pages, Twitter accounts, and other sites created or accessed by College users.
 
REASON FOR POLICY: 
 
This policy is designed to protect the safety and individual rights of Utica College employees, safeguard the College from legal action, and provide an environment where the College network is safe and reliable.
 
PROCEDURES: 
 
Procedures for complying with this policy are outlined in the policy statement, above. Additional information can be found in the document titled Guidelines for Responsible Use of College Computing.
 
Users who violate this policy may be denied access to College computing resources and may be subject to other penalties and disciplinary action, both within and outside the College. Violations will normally be handled through the College disciplinary procedures applicable to the relevant user. For example, alleged violations by students will normally be investigated, and any penalties or other discipline will normally be imposed, through the disciplinary system administered by the Office of Student Affairs. However, the College may temporarily suspend or block access to an account, prior to the initiation or completion of such procedures, when it reasonably appears necessary to do so in order to protect the integrity, security, or functionality of College computing resources or to protect the College from liability or reputational harm. The College may also refer suspected violations of applicable law to appropriate law enforcement agencies.
 
Security and Privacy
 
The College employs various measures to protect the security of computing resources and users’ accounts. Users should be aware, however, that the College cannot guarantee such security. Users should therefore engage in prudent computing practices by establishing robust access restrictions for their accounts, guarding their passwords, and changing them regularly.  For more information, see the College’s Computer Passwords policy.
 
Users should also be aware that their use of College computing resources is not completely private. While the College does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the College’s computing resources require the backup and caching of data and communications, logging of activity, the monitoring of general usage patterns the scanning of systems and network ports for anomalies and vulnerabilities, and other such activities that are necessary for the provision of service and network integrity. Subject to applicable law and contractual arrangements, the College may also specifically monitor the activity and accounts of individual users of College computing resources, including individual login sessions and communications, without notice, in any of the following situations: 
  • The user has given permission or has voluntarily made them accessible to the public, for example by posting to a publicly accessible webpage or providing publicly accessible network services.
  • It reasonably appears necessary to do so to protect the integrity, security, or functionality of the College or other College-related computing resources or to protect the College from liability or reputational harm.
  •  There is a reasonable basis to believe that the user has violated, or is violating, this policy.
  • An account appears to be engaged in unusual or unusually excessive activity, as indicated by the monitoring of general activity and usage patterns.
  • It is otherwise required or permitted by law.
 
Any such individual monitoring, other than the specified in paragraph (a) above, that is required by law or necessary to respond to perceived emergency situations, must be authorized in advance by the Office of Legal Affairs.
 
The College, in its discretion, may disclose the results of any such general or individual monitoring, including the contents and records of individual communications, to appropriate College personnel or law enforcement agencies and may use those results in appropriate College disciplinary proceedings. Communications made by means of College computing resources are also generally subject to New York’s Freedom of Information Law to the same extent as they would be if made on paper.
 
RESPONSIBILITY:
 
It is the responsibility of the Office of Integrated Information Technology Services to update this document and properly notify the College community of changes to this policy.
 
ENFORCEMENT:
 
Violations of the policy should be reported to the Information Security Officer, who will refer issues to the appropriate office or agency.
 
Enforcement of Utica College policies is the responsibility of the office or offices listed in the “Resources/Questions” section of each policy. The responsible office will contact the appropriate authority regarding faculty or staff members, students, vendors, or visitors who violate policies.
 
Utica College acknowledges that College policies may not anticipate every possible issue that may arise. The College therefore reserves the right to make reasonable and relevant decisions regarding the enforcement of this policy. All such decisions must be approved by an officer of the College (i.e. President, Provost and Vice President for Academic Affairs, Executive Vice President and Chief Advancement Officer, Vice President for Financial Affairs, or Vice President for Legal Affairs and General Counsel).
 
RESOURCES/QUESTIONS:
 
For more information, contact the Information Secority Officer:
 
James Farr
infosecurity@utica.edu
(315) 223-2386
 
Use of College computing resources is also the subject to the College’s Code of Student Conduct, the College’s policy on Academic Misconduct, and all other generally applicable College policies.
         
Please note that other Utica College policies may apply or be related to this policy. To search for related policies, use the Keyword Search function of the online policy manual.
 



Effective Date:
04/01/2013
Promulgation Date:
04/12/2013