Acceptable Use Policy
- Former user (Deleted)
- Admin JBB (Deactivated)
- Christopher Taverna
DOCUMENT INFORMATION |
---|
Document Title | Acceptable Use Policy | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Document Type |
| ||||||||||||
Office/Unit | Information Technology | ||||||||||||
Document Owner | |||||||||||||
Contact Information |
| ||||||||||||
Approval Date | 11/9/2016 | ||||||||||||
Approved by | President's Cabinet | ||||||||||||
Effective Date | 11/9/2016 | ||||||||||||
Review Date/Schedule | |||||||||||||
Revision History |
DOCUMENT CONTENT |
---|
Reason for PolicyAccess to information technology is essential to the mission of the State University of New York at Fredonia ("Fredonia") in providing Fredonia students, faculty and staff with educational services of the highest quality. The pursuit and achievement of the SUNY mission of education, research, and public service require that the privilege of the use of computing systems and software, internal and external data networks, as well as access to the Internet, be made available to all those of the Fredonia community. The preservation of that privilege for the full community requires that each faculty member, staff member, student, and other authorized user comply with institutional and external standards for appropriate use, whether on campus or from remote locations. Policy StatementTo assist and ensure compliance with internal and external acceptable usage standards, Fredonia establishes the following policy which supplements all applicable Federal and State policies, including harassment, patent and copyright, student and employee disciplinary policies, and FERPA, as well as applicable federal and state laws. ScopeThe following document outlines Fredonia's policy on Fredonia-provided access to electronic information, services, computing facilities, and networks. All creation, processing, communication, distribution, storage, and disposal of information by any combination of Fredonia resources and non-Fredonia resources are covered by this policy. Technology resources covered by this policy include, without limitation:
Definitions
Policy StatementUsers of Fredonia's computing resources must comply with federal and state laws, Fredonia rules and policies, and the terms of applicable contracts including software licenses while using Fredonia computing resources. Users who engage in electronic communications with persons in other states or countries or on other systems or networks may also be subject to the laws of those jurisdictions and the rules and policies of those other systems and networks. Users with questions as to how the various laws, rules and resolutions may apply to a particular use of Fredonia's computing resources should contact the Chief Information Officer's office for more information. Users are responsible for ascertaining what authorizations are necessary and such authorizations prior to using Fredonia computing resources. Users are responsible for any activity originating from their accounts which they can reasonably be expected to control. Accounts and passwords may not, under any circumstances, be used by persons other than those to whom they have been assigned by the account administrator. In cases when unauthorized use of accounts or resources is detected or suspected, the account owner should change the password and report the incident. Although there is no set bandwidth, CPU time, or other limit applicable to all uses of Fredonia's computing resources, Fredonia may require users of those resources to limit or refrain from specific uses if, in the opinion of the system administrator, such use interferes with the efficient operations of the system. Users are also expected to refrain from deliberately wasteful practices such as printing unnecessary large documents, performing endless unnecessary computations, or unnecessarily holding public computers for long periods of time when others are waiting for the same resources. Users must not use computing resources to gain unauthorized access to remote computers or to impair or damage the operations of computers or networks, terminals or peripherals. This includes blocking communication lines, intercepting or sniffing communications, and running, installing or sharing virus programs. Deliberate attempts to circumvent data protection or other security measures are not allowed. Network services and wiring may not be tampered with or extended beyond the area of their intended use. This applies to all network wiring, hardware and in-room jacks. Users shall not use the residential network to provide Internet access to anyone outside of the Fredonia community for any purpose other than those that are in direct support of the academic mission of Fredonia. User AccountsUse of Fredonia's computer systems and network requires that a user account be issued by Fredonia. Every computer user account issued by Fredonia is the responsibility of the person in whose name it is issued. Continued use of a previously assigned and previously enabled "@fredonia.edu" email account by an inactive or a transferred student is at the discretion of the Chief Information Office. Such accounts, if re-enabled will not be considered “theft-of-service”. Fredonia recognized clubs and student organizations may be issued a user account. Faculty advisors shall designate a particular person{s) authorized to act on behalf of the club or organization. This person{s) is responsible for all activity on the account and will be subject to Fredonia's disciplinary procedures for misuse. The following will be considered theft of services, and subject to penalties described below:
ResourcesFredonia's information technology resources are, by nature, finite. All members of the Fredonia community must recognize that certain uses of Fredonia's information technology resources may be limited for reasons related to the capacity or security of Fredonia's information technology systems, or as required for fulfilling Fredonia’s mission. Users shall not use information technology resources to excess. Excessive use of information technology resources by a particular user, or for a particular activity, reduces the amount of resource available to satisfy the needs of other users. Excessive use may degrade or jeopardize system functionality, and can result in significant costs to Fredonia. Some examples of excess use may include writing a program or script or using an Internet bot to perform a repetitive task such as attempting to register for a class or purchasing concert tickets online. Users shall limit incidental personal use. Incidental personal use is an accepted and appropriate benefit of being associated with Fredonia. Appropriate incidental personal use of technology resources does not result in any measurable cost to Fredonia, and benefits Fredonia by allowing personnel to avoid needless inconvenience. Incidental personal use must adhere to all applicable Fredonia policies. Under no circumstances may incidental personal use involve violations of the law, interfere with the fulfillment of an employee's professional responsibilities, or adversely impact or conflict with activities supporting the mission of Fredonia. Examples of incidental personal use may include, sending a personal email or visiting a non-work-related web site. Security & PrivacyFredonia employs various measures to protect the security of its computing resources and its user's accounts. Users should be aware, however, that Fredonia cannot guarantee security and confidentiality. Users should therefore engage in "safe computing" practices by establishing appropriate access restrictions for their accounts, guarding their passwords and changing them regularly. Users shall not intentionally view information of other users, modify or obtain copies of other users' files, access or attempt to access other users' email, or modify other users' passwords without their permission. Fredonia computers and networks are designed to protect user personal privacy and as such, users shall not attempt to circumvent these protections. Users shall not develop or use procedures to alter or avoid the accounting and monitoring of the use of computing facilities. For example, users may not utilize facilities anonymously or by means of an alias, and may not send messages, mail, or print files that do not show the correct username of the user performing the operation. Users shall not circumvent or attempt to circumvent security mechanisms or the intent of a system. Computers are Fredonia owned state assets, as such Fredonia retains the inherent right to access these resources either directly or indirectly through remote access tools and techniques at any time. While Fredonia does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the Fredonia's computing resources may require the backup and caching of data and communications, the logging of activity, the monitoring of general usage patterns and other such activities that are necessary for the provision of service. Fredonia may also specifically monitor or inspect the activity and accounts of individual users of Fredonia's computing resources, including individual login sessions and the content of individual communications, without notice, when:
Laws and Fredonia PoliciesUsers must employ technology resources consistent with local, state and federal laws and Fredonia policies. Examples include but are not limited to:
Commercial UseComputing resources are not to be used for personal commercial purposes or for personal financial or other gain. Occasional personal use of Fredonia's computing resources for other purposes is permitted when it does not consume a significant amount of those resources, does not interfere with the performance of the user's job or other Fredonia assigned responsibilities, and is otherwise in compliance with this policy. Further limits may be imposed upon personal use in accordance with normal supervisory procedures concerning the use of Fredonia's equipment. EnforcementUsers who violate this policy may be denied access to Fredonia's computing resources and may be subject to other penalties and disciplinary action, including possible expulsion or dismissal. Alleged violations will be handled through Fredonia's disciplinary procedures consistent with the terms and conditions of the governing labor agreements (if applicable). Fredonia may suspend, block or restrict access to an account, independent of such procedures, when it reasonably appears necessary to do so in order to protect the integrity, security, or functionality of Fredonia's or other computing resources or to protect Fredonia from liability. Fredonia may also refer suspected violations of applicable law to appropriate law enforcement agencies. When Information Technology Services becomes aware of a possible violation, Information Technology Services will initiate an investigation in conjunction with relevant campus offices including the President's Cabinet members, Human Resources, and University Police in accordance with collective bargaining rights for applicable unions. Users are expected to cooperate fully in such investigations when requested. In order to prevent further unauthorized activity during the course of such an investigation, Information Technology Services may suspend authorization for use of all computing facilities for the user(s) involved in the violation. Related Documents, Forms, and Tools
| |||||||||||||||||||
FAQ's | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Keywords | |||||||||||||||||||
Category(s) |
| ||||||||||||||||||
Sub-Category(s) |