Information Technology Policy
Use of the technology resources (computing, networks, information, telephones, etc.) of East Central College (the “college”) is restricted to purposes related to the college’s mission of education and public services within the context and traditions of academic freedom. Access to the college’s technology resources is a privilege, not a right, granted to the college’s faculty, staff and students in support of their studies, instruction, academic and student life, college responsibilities, official business of the college, and other college-sanctioned activities. Individuals outside of the college may be granted access to the college’s technology resources only with the express, prior authorization of the Director of Information Technology, President, or appropriate administrator, and only for a purpose consistent with the college’s mission.
Authorized users of the college’s technology resources are expected to act responsibly, ethically and lawfully. At a minimum, authorized users are expected and required to comply with the Rules of Use contained within this policy and with all applicable laws. Violators of these rules may have their ability to use the college’s technology resources limited, suspended or revoked, may be subject to the college’s disciplinary procedures, and may be subject to prosecution under federal, state and local law.
Rules of Use:
1. No one will use any of the college’s technology resources without proper authorization, nor will anyone assist in, encourage, or conceal from the college any unauthorized use or attempt at unauthorized use of any of the college’s technology resources.
- Each user will take steps to ensure the confidentiality of his or her password or user ID and to protect his or her files, data, printouts and electronic mail from unauthorized users.
- No one will give any password or user ID for any of the college’s technology resources to any unauthorized person.
- No one will obtain, possess, use or attempt to use anyone else’s password or user ID, regardless of how the password or ID was obtained.
- Any user who determines that someone has made an unauthorized use of his or her account, password or user ID, will report that breach of security to the college’s Director of Information Technology.
2. No one will use the college’s technology resources for illegal, commercial or profit-making purposes.
3. No one will use any of the college’s technology resources to attempt an unauthorized use, or to interfere with anyone else’s legitimate use, of any computer or network facility anywhere.
- No one will attempt to obtain system privileges to which he or she is not entitled.
- No one will access or attempt to access anyone else’s account, system, files or data without proper authorization.
- No one will use the college’s technology resources to engage in any form of academic dishonesty, such as plagiarism or cheating.
- No one will use the college’s technology resources in ways that unnecessarily impede or disrupt the computing activities of others.
- No one will attempt to prevent others from accessing services.
- No one will participate in any scheme to deliberately flood a computer with excessive amounts of electronic mail (“mail bombing”).
4. No one will attempt to endanger or breach the security or operation of any of the college’s technology resources.
- No one will run nor distribute a program on any of the college’s technology resources, unless the user is confident that the program will not harm or endanger the system.
5. No one will knowingly create, install or distribute a computer virus or any other type of destructive program on any of the college’s technology resources, or otherwise damage or destroy any equipment, software or data belonging to the college or any other user.
6. No one, without proper authorization, will modify or reconfigure the software or hardware of any of the college’s technology resources.
7. No one will use any of the college’s technology resources in a manner that violates the privacy of other users.
- No one, without proper authorization, will access, read, copy, alter or delete any other person’s computer, files, electronic mail, or account information.
- No one will attempt to intercept or otherwise monitor any network communications not explicitly meant for them.
- No one will create, install or distribute any program that is designed to trick or deceive users into revealing confidential information about themselves.
8. No one will use any of the college’s technology resources to access or transmit images, messages, communications or other materials that can be deemed to be obscene, threatening, harassing, annoying, defamatory, fraudulent or unlawful.
- No one will use the college’s technology resources to access, download or send material that is damaging to the college, including but not limited to obscene or sexually explicit material.
- No one will transmit on any of the college’s technology resources electronic mail or messages that may be deemed to contain profanity or obscenity.
- Anyone who has received, in his or her opinion, a threatening, obscene, harassing, annoying, defamatory, fraudulent, unlawful or unwanted message, communication or other material will report that to the college’s Director of Information Technology.
9. No one will misrepresent his or her identity or his or her relationship to the college when obtaining computing or network privileges, or when using any of the college’s technology resources or in any electronic communication with anyone else.
- No one will falsely attribute or forge the origin of electronic mail, messages or postings.
10. No one will install, copy or otherwise use any software or data in violation of applicable copyrights or license agreements.
- No one will make nor distribute unauthorized copies of software or data contained in the college’s technology resources, nor will anyone install or use unauthorized or pirated software on any of the college’s technology resources.
11. Users of the college’s resources will only communicate or distribute electronic mail to clearly identified groups of interested individuals who may reasonably be expected to want to receive the transmission, and will not engage in the mass broadcasting of electronic mail nor the distribution of chain letters (messages asking the recipient to distribute further copies).
- No one will send electronic mail to unwilling recipients, nor participate in the distribution of unsolicited commercial advertising (“spam”) through electronic mass mailings.
12. No one will post any documents or pages on the college’s website that do not comply with these rules or have not been approved by the college’s Web Committee or the Director of Information Technology.
The rules set forth above are intended to help authorized users use the college’s technology resources responsibility and in compliance with the applicable laws. The rules are not intended to be exhaustive, and the college specifically reserves for itself the right to add to and modify these rules within its discretion. The college also specifically reserves the right to enforce its interpretation of these rules, as well as the right to discipline a user or limit, suspend or revoke a user’s ability to use the college’s technology resources if the college, in its opinion, believes that the user has misused or abused those resources, even though the user’s particular conduct may not be specifically listed in the rules above. All users of the college’s technology resources are responsible for being aware of and complying with this policy, as well as with all of the college’s other pertinent policies and procedures.
If a user suspects any violation of the above rules, the user should notify the college’s Director of Information Technology. Users of the college’s technology resources are expected to cooperate with the Director of Information Technology in the operation of these resources and the investigation of any misuse or abuse.
In order to ensure the integrity of the college’s technology resources and compliance with the rules set forth above, the college specifically reserves for itself the right to monitor, inspect and review any and all systems, files, data, mail, communications and other transmissions created, compiled, accessed, stored, or sent on any of the college’s technology resources. Furthermore, in order to ensure the integrity of the college’s technology resources, the college specifically reserves the right to immediately suspend, without any advance notice, the network and computing privileges of any user who is alleged to have misused or abused any of the college’s technology resources. The college, in addition, reserves the right to discard incoming mass mailings that involve unsolicited commercial advertising (“spam”) without notifying the sender or recipient, as well as the right to block all Internet communications from sites that are involved in extensive mass mailings or other disruptive practices or which contain sexually explicit content or other content that is, in the opinion of the college, inconsistent with its mission.
Although the college allows its students, faculty and staff to post pages and messages on its website, the college considers its website to be an official publication of the college and, therefore, reserves for itself the right to actively monitor, modify and remove pages and messages from its website. The college’s Web Committee has overall responsibility for all pages maintained on the college’s website. The content of any pages or messages posted on the college’s website must meet with the approval of the Web Committee and must conform with the rules set forth above and all other applicable rules and policies of the college.
Although the college seeks to provide users with a stable and reliable computer network, the college cannot guarantee against a loss of data, files and/or software as a result of system crashes, network outages, power outages or similar interruptions in service. Accordingly, the college disclaims any liability for loss of data, damages, service interruptions or failure to deliver services. The college also disclaims any responsibility and/or guarantees for data, information and materials contained in systems or sites not developed by the college, such as those obtained through the Internet.
Any questions regarding this policy and its corresponding rules should be directed to the college’s Director of Information Technology.
Review of this policy will be regular and consistent with the development of technology.