ROCK VALLEY COLLEGE PROCEDURE
PROCEDURE TITLE:Acceptable Use of Information Technology Systems
EFFECTIVE DATE:May 26, 2009
REVIEW CYCLE:1 years
Rock Valley College maintains Information Technology (IT) systems (voice, video and data hardware and software resources) in support of the Colleges mission. This procedure exists to protect the rights and privileges of the users of the IT systems, to ensure compliance with all applicable laws and regulations, and to safeguard Rock Valley College and its resources. All Information Technology systems and resources are to be used only in accordance with the rules and procedures identified herein. It is the responsibility of all users of College IT systems to be familiar with, understand and comply with this procedure. Examples are provided for illustrative purposes, but are not necessarily exhaustive.
- USAGE
The Rock Valley College Information Technology systems (voice, video and data hardware and software resources) are to be used only by those individuals authorized to do so by approval of the Managing Director of Information Technology or designee. It is the responsibility of all users of College IT systems to safeguard their passwords and their use of such systems. The College reserves the right to regulate the content of, and connections to, its IT systems. Inappropriate use of the Colleges IT systems is prohibited; examples include: - unauthorized use, attempted use, or manipulation of Rock Valley College telephones and telephony systems, including the abuse of dial-up, wireless networks, televisions, microwave or video systems, computers, computer facilities, networks, systems, software programs and systems, or data; and
- attempting to thwart or disrupt the operation of College business through manipulation of the security of IT systems.
- Usage of the Microwave System should be used in conjunction with the EBS guidelines.
- PRIVACY
Users have no expectation of privacy in connection with their use of IT systems, except where a users confidential information or usage is otherwise protected by federal or state law (e.g., FERPA, HIPAA). The College has discretion to monitor use of its IT systems with or without notice to users, consistent with federal or state laws and regulations. Documents, email messages and other files that are deleted by users may nonetheless be archived by the College, which has a right to subsequently retrieve such material, except where protected by federal or state law. Individual users investigating, reading or accessing the private files of other users without appropriate authorization are in violation of privacy guidelines. Examples include: - accessing or attempting to access another user's computer files without permission of the owner or by authorization of ones supervisor; and
- supplying or attempting to supply false or misleading information or identification in order to access another user's computer files.
- THEFT
Technology-related theft is expressly forbidden. Examples include: - the unauthorized removal or attempted removal of RockValleyCollege information technology resources (hardware, software, data, etc.); and
- copying or attempting to copy data or software without proper authorization by the Office of Information Technology.
- VANDALISM
Alteration or attempted alteration of information technology resources, including IT hardware, software, data, or other files, or network destruction or disruption, is considered vandalism. Examples include: - sending mail, files, or programs which will inordinately replicate, inflict viruses, or otherwise do damage to another user's account;
- tampering with or obstructing the operation of information technology systems, including attempts to crash systems;
- inspecting, modifying, or distributing data or software, or attempting to do so, without proper authorization;
- interfering or attempting to interfere with the performance of information technology systems; and
- damaging or defacing IT hardware or software.
- COPYRIGHT
The redistribution of any software, videography or copyrighted material in electronic format is prohibited, except in the case of material which is clearly marked as being public or freely distributable or material which is covered by the “Fair Use Doctrine”. Users who redistribute software owned by or licensed to RockValleyCollegewithout authorization from the Office of Information Technology violate agreements with software suppliers, as well as applicable federal copyright, patent and trade secret laws. Examples include: - copying, transmitting, or disclosing data, software, documentation, or attempting to do so, without proper authorization.
- HARASSMENT
All use of College IT systems must conform to all federal and state laws prohibiting workplace harassment (including Title VII, Title IX, and the Illinois Human Rights Act). Harassment of other users of information technology systems can involve the sending of unsolicited, unwanted or non-work related messages or files, singly or repeatedly. Examples include: - interfering or attempting to interfere with the legitimate work of another user;
- sending abusive or obscene messages via computer networks; and
- attempting to use information technology resources to engage in the abuse of other users.
- COMMUNICATIONS
All authorized Rock Valley College users will adhere to the Rock Valley College Web Page Policy. Violations would include:: - sending chain letters, or sending mass mailings not authorized by designated College personnel;
- use of the information technology systems for personal advertisements or personal profit, except as authorized by designated College personnel;
- intentionally using information technology resources to access materials or participate in communications that are abusive, unethical, violations of privacy, obscene or pornographic.
- MISCELLANEOUS
- unauthorized and time-consuming recreational activities and game playing;
- using network accounts for work not authorized for that account;
- engaging in disruptive behavior in college computer labs;
- using the information technology systems for any illegal purposes;
- use of software or hardware not properly licensed or authorized by the Office of Information Technology, or found to be in conflict with other IT systems, or altering system configurations; and
- knowingly using information technology resources (including printers) to pursue personal matters that are distinct from RVC-related student assignments or distinct from assigned job duties and responsibilities, except where such use is minimal and infrequent in nature, does not otherwise violate provisions herein, and has inconsequential financial impact.
All requests for clarifications or interpretations of this procedure should be directed to the Managing Director of Information Technology. RVC students believed to be in violation of this procedure will be referred to the student disciplinary procedure; employees believed to be in violation will be referred to employee disciplinary procedures consistent with applicable College policies and contractual obligations. All other presumed violators will be handled on a case-by-case basis.
1
Adopted May 26, 2009