Internet/Technology Use Policies

Glen Oaks Community College Responsible Use Of Information Technology Policy

Policy 2.71
 

  1. Purpose
    The College Network incorporates all electronic communication systems and equipment at Glen Oaks Community College (the College”). This Network Acceptable Use Policy (“AUP”) sets forth the standards by which all Users may use the shared College Network. The College Network is provided to support the College and its mission of education, service, and research. Any other uses (other than permitted personal use as discussed below), including uses that jeopardize the integrity of the College Network, the privacy or safety of other Users, or that are otherwise illegal are prohibited. The use of the College Network is a revocable privilege.

    By using or accessing the College Network, Users agree to comply with this AUP and other applicable College policies which may be implemented from time to time, as well as all federal, state, and local laws and regulations. Only Users are authorized to use and/or access the College Network. The term “User” refers to any faculty, staff, or student associated with the College, as well as any other individual with access to computers or other network devices that have been approved by the Network Administrator or Dean of Finance and Administrative Services (DFA) for connection to the College Network. This definition includes, but is not limited to, contractors, visitors, and temporary affiliates.
  2. Principles

    General requirements for acceptable use of the College Network are based on the following principles:

    1. Each User is expected to behave responsibly with respect to the College Network and other Users at all times.
    2. Each User is expected to respect the integrity and the security of the College Network.
    3. Each User is expected to behave in a manner consistent with College’s mission and comply with all applicable laws, regulations, and College policies.
    4. Each User is expected to be considerate of the needs of other Users by making every reasonable effort not to impede the ability of others to use the College Network and show restraint in the consumption of shared resources.
    5. Each User is expected to respect the rights and property of others, including privacy, confidentiality and intellectual property.
    6. Each User is expected to cooperate with the College to investigate potential unauthorized and/or illegal use of the College Network.
    7. Each User is expected to respect the security and integrity of College computer systems and data.
  3. Prohibitions

    Without limiting the general guidelines listed above, unless expressly agreed to by the Network Administrator, the following activities are specifically prohibited:

    1. Users may not attempt to disguise their identity, the identity of their account or the machine that they are using. Users may not attempt to impersonate another person or organization. Users may likewise not misuse or appropriate the College’s name, network names, or network address spaces.
    2. Users may not attempt to intercept, monitor, forge, alter or destroy another User’s communications. Users may not infringe upon the privacy of others’ computer or data. Users may not read, copy, change, or delete another User’s data or communications without the prior express permission of such other User.
    3. Users may not use the College Network in a way that:

      1. disrupts, adversely impacts the security of, or interferes with the legitimate use of any computer, the College Network or any network that the College connects to,
      2. interferes with the supervisory or accounting functions of any system owned or managed by the College, or
      3. take action that is likely to have such effects.

      Such conduct includes, but is not limited to: hacking or spamming, placing of unlawful information on any computer system, transmitting data or programs likely to result in the loss of an individual’s work or result in system downtime, sending “chain letters” or “broadcast” messages to lists or individuals, or any other use that causes congestion of any networks or interferes with the work of others.

    4. Users may not distribute or send unlawful communications of any kind, including but not limited to cyber stalking, threats of violence, obscenity, child pornography, or other illegal communications (as defined by law). This provision applies to any electronic communication distributed or sent within the College Network or to other networks while using the College Network.
    5. Intentional access to or dissemination of pornography by College employees, temporary staff, contractors, or vendors is prohibited unless (1) such use is specific to work-related functions and has been approved the respective manager or (2) such use is specifically related to an academic discipline or grant/research project. This provision applies to any electronic communication distributed or sent within the College Network or to other networks while using the College Network.
    6. Users may not attempt to bypass network security mechanisms, including those present on the College Network, without the prior express permission of the owner of that system. The unauthorized network scanning (e.g., vulnerabilities, post mapping, etc.) of the College Network is also prohibited. For permission to perform network scans, user must receive prior approval by calling the Network Administrator.
    7. Users may not engage in the unauthorized copying, distributing, altering or translating of copyrighted materials, software, music or other media without the express permission of the copyright holder or as otherwise allowed by law. Information on the Digital Millennium Copyright Act can be found at:

      http://www.copyright.gov/legislation/dmca.pdf

      and the Copyright Act at:

      http://www.copyright.gov/title17/.
    8. Except as allowed under the Personal Use Policy or the Policy on Use of College Resources in Support of Entrepreneurial Activities. Users may not use the College Network for private business, commercial or political activities, fundraising, or advertising on behalf of non-College organizations, unlawful activities, or uses that violate other College policies.
    9. Users may not extend or share with public or other users the College Network beyond what has been configured accordingly by Network Administrator. Users are not permitted to connect any network devices or systems (e.g., switches, routers, wireless access points, VPNs, and firewalls) to the College Network without advance notice to and consultation with the Network Administrator. To contact the Network Administrator, users must call Extension 315 and submit an IT request form.
    10. Users are responsible for maintaining minimal security controls on their personal computer equipment that connects to the College Network, including but not limited to: current antivirus software, current system patches, and strong passwords.
    11. Users may not violate any laws or ordinances, including, but not limited to, laws related to copyright, discrimination, harassment, threats of violence and/or export controls.
  4. Review and Penalties

    The College reserves the right to review and/or monitor any transmissions sent or received through the College Network. Access to other transmissions sent or received through the College Network may occur in the following circumstances:

    1. in accordance with generally accepted, network administration practices;
    2. to prevent or investigate any actual or potential information security incidents and system misuse, if deemed necessary by authorized personnel;
    3. to investigate reports of violation of College policy or local, state, or federal law;
    4. to comply with legal requests for information (such as subpoenas and public records requests); and
    5. to retrieve information in emergency circumstances where there is a threat to health, safety, or College property involved

    Penalties for violating this AUP may include:

    1. Restricted access or loss of access to the College Network;
    2. Disciplinary actions against personnel and students associated with the College,
    3. Termination and/or expulsion from the College, and
    4. Civil and/or criminal liability.

    The College, in consultation with its legal counsel, may contact local or federal law enforcement authorities to investigate any matter at its sole discretion.

  5. Policy Updates
    The College reserves the right to update or revise this AUP or implement additional policies in the future. Users are responsible for staying informed about College policies regarding the use of computer and network resources and complying with all applicable policies. The College shall provide notice of any such modifications or amendments by email to the College community. Any such modification shall be effective immediately upon notice being provided regardless of whether subscriber actually reads such notice.

 

Adopted by Board of Trustees April 9, 1997, revised June 9, 1999, January 12, 2000, October 13, 2004, and June 11, 2014.

Glen Oaks Community College Acceptable Internet Use Policy

Policy 3.60
 

  1. Purpose

    Information technology resources, including email and Internet access, are provided for educational purposes. Adherence to the following policy is necessary for continued access to the college’s technology resources. This policy is designed to guide students, faculty, and staff in the acceptable use of computer systems, networks, and other information technology resources at Glen Oaks Community College.
  2. Guiding Principles

    1. Non-public Forum. Information technology at Glen Oaks Community College is a non-public forum. The College reserves the right to restrict access to and the use of information technology resources in a manner consistent with federal and state law.
    2. Creativity Encouraged. The College community is encouraged to make innovative and creative use of information technologies in support of educational, scholarly, and administrative purposes.
    3. Copyrighted Materials. Glen Oaks Community College recognizes the importance of copyright and other protections afforded to the creators of intellectual property. Users are responsible for making use of software and other information technology resources in accordance with copyright and licensing restrictions and applicable College policies. Using information technology resources in a manner violating these protections, or furthering the unauthorized use or sale of protected intellectual property, is prohibited.
    4. Offensive Material. Glen Oaks Community College cannot protect individuals against the receipt of potentially offensive material. Those who use electronic communications occasionally may receive material that they might find offensive. Those who make personal information available about themselves through the Internet or other electronic media may expose themselves to potential invasions of privacy.
    5. Use IT Wisely. Information technology resources are provided to support the College’s scholarly, educational, and administrative activities in fulfilling the mission of the College. Information technology resources are limited, and should be used wisely and with consideration for the rights and needs of others.
    6. Privilege, Not a Right. The use of Glen Oaks Community College computer systems, networks and other information technology resources is a privilege, and not a right. Inappropriate use of such resources may result in suspension or termination of privileges and/or other discipline. The College further reserves the right to monitor Internet use and determine if specific uses are consistent with this Acceptable Use policy, and to deny access to prevent unauthorized or unacceptable activity.
  3. User Responsibilities

    1. Protect your Password. Users are expected to use computer and network resources in a responsible manner. Users should take appropriate precautions to ensure the security of their passwords and prevent others from obtaining access to their computer resources. Convenience of file or printer sharing is not a sufficient reason for sharing computer accounts and passwords.
    2. College Image. Users should remember that information distributed through the College’s information technology resources may be considered a form of publication. Although Glen Oaks Community College does not take responsibility for material issued by individuals, users must recognize that third parties may perceive anything generated at Glen Oaks Community College as in some manner having been produced under Glen Oaks Community College auspices. Accordingly, users are reminded to exercise appropriate language, behavior, and style in their use of information technology resources.
    3. Prohibited Practices. The following behaviors are prohibited while using College information technology resources, including computers and networks owned or operated by Glen Oaks Community College, or to which Glen Oaks Community College is connected:

      1. Modifying system or network facilities, or attempting to crash systems or networks;
      2. Using, duplicating or transmitting copyrighted material without first obtaining the owner’s permission, in any way that may reasonably be expected to constitute an infringement, or that exceeds the scope of a license, or violates other contracts;
      3. Tampering with software protections or restrictions placed on computer applications or files;
      4. Using College information technology resources for personal for-profit purposes;
      5. Impersonating another user or otherwise falsifying a user name in email;
      6. Degrading or disrupting the network, hindering access to the network, or otherwise excessively using resources in a manner which effectively denies service to other users;
      7. Sending chain letters, junk mail, “spam,” or other similar types of broadcast messages or messages that use pyramid schemes to distribute communications to an exponentially growing collection of recipients;
      8. Sending mail that is deliberately designed to interfere with proper mail delivery or access;
      9. Using information technology resources in a manner that is disruptive of the workplace or educational purpose of the College, or which otherwise hinders the effectiveness of the institution;
      10. Using information technology resources to access, store, or transmit pornographic or obscene material in violation of Michigan criminal laws, including, but not limited to Michigan obscenity laws MCLA 752.361-752.374 and other Michigan statutes and cases concerning obscenity;
      11. Sending messages that are malicious or that a reasonable person would find to be harassing or threatening;
      12. Accessing another person’s computer account without permission. Users may not supply false or misleading data, or improperly obtain an others password to gain access to computers or network systems, data or information. Obtaining access to an account name or password through the negligence or oversight of another is considered to be a specifically prohibited use;
      13. Intentionally introducing computer viruses, worms, or other rogue programs into information technology resources that belong to, are licensed to, or are leased by Glen Oaks Community College or others;
      14. Physically damaging information technology resources;
      15. Using, or encouraging others to use, information technology resources in any manner that would violate this or other College policies or any applicable state or federal law; and
      16. Falsely reporting or accusing another of conduct that violates this policy, without a good faith basis for such an accusation.
    4. Incidental Use. Ability to access computing resources does not, by itself, imply authorization to do so. Users are responsible for learning what authorizations are necessary and for obtaining them from the appropriate supervisor before proceeding. Incidental use is defined as occasional, limited, and without significant cost in time or college resources. Supervisors are expected to use professional judgment to determine whether an employee’s personal use is incidental. Incidental use of College-owned computer systems for personal purposes is permitted if:

      1. Use occurs outside of the employee’s work schedule;
      2. Use does not interfere with work being performed by another employee;
      3. Use is not for pay or profit;
      4. Use does not consume excessive supplies— as determined by a supervisor, employees may be asked to replace supplies consumed beyond an incidental level;
      5. Use does not violate software licensing agreements;
      6. Use does not expose confidential or personnel information to others who should not have access to such information.

  4. Policy Administration

    1. College Access to Your Files. The College encourages all members of its community to use electronic resources in a manner that is respectful of others.

      Generally, the College will not make the contents of electronic mail available to those other than the originator and intended recipient. While respecting users’ privacy to the fullest extent possible, however, the College reserves the right to examine any computer files. The College reserves this right for bona fide purposes, including, but not limited to:

      1. Enforcing policies against harassment and threats to the safety of individuals;
      2. Protecting against or limiting damage to College information technology resources;
      3. Complying with a court order, subpoena or other legally enforceable discovery request;
      4. Investigating and preventing the posting of proprietary software or electronic copies of texts, data, media or images in disregard of copyright, licenses, or other contractual or legal obligations or in violation of law;
      5. Safeguarding the integrity of computers, networks, hardware, software and data;
      6. Preserving information and data;
      7. Upgrading or maintaining information technology resources;
      8. Cooperating with law enforcement authorities in reporting and investigating suspected criminal activity.
    2. Servers. All servers must be approved by the College. Root access must be given to the Dean of Finance and Administrative Services or designee for all servers on the Glen Oaks Community College network.
    3. Terminating Your Use of Computers. The College may suspend or terminate the use of its computers and network systems when presented with evidence of a user’s violation of College policies, or federal or state laws, or when it is necessary to do so to protect the College against potential legal liability. The College reserves the right to limit access to its information technology resources, and to remove or limit access to material stored on College information technology resources.
    4. Disciplinary Action. All users are expected to conduct themselves consistent with these responsibilities. Abuse of computing privileges may subject the user to disciplinary action as established by applicable College policies and/or collective bargaining agreements.
    5. Bound by Public Law. The College and users must recognize that all members of the College community are bound by federal and state laws pertaining to civil rights, harassment, copyright, security and other statutes governing use of electronic media. This policy does not preclude enforcement under such laws.
  5. Indemnification and Warranties

    1. Glen Oaks Community College makes no warranties of any kind whether expressed or implied, for the computer services it provides.
    2. Glen Oaks Community College assumes no responsibility for any direct or indirect damages arising from the user’s connection to the Internet. The College is not responsible for the accuracy of information found on the Internet, but rather merely facilitates the accessing and dissemination of information through its systems. Unless the College expressly authors content, it has no editorial control over the content distributed or disseminated on the network and users are solely responsible for any material that they access and disseminate.
    3. Users hereby agree to indemnify and hold Glen Oaks Community College and its officers, Trustees, employees and agents harmless for any loss, damage, expense or liability resulting from any claim, action or demand, arising out of or related to the users’ use of Glen Oaks Community College owned technology resources and network, including reasonable attorney fees. Such claims shall include, without limitation, those based on trademark or service mark infringement, trade name infringement, copyright infringement, dilution, tortuous interference with contract or prospective business advantage, unfair completion, defamation, unlawful discrimination or harassment, rights of publicity, and invasion of privacy.
  6. Reporting Violations

    Allegations of student conduct that is believed to violate this Acceptable Use policy should be reported in writing to the Assistant Dean of Students and Community Services. Allegations of faculty or staff conduct that is believed to violate this Acceptable Use Policy should be reported in writing to the Dean of Finance and Administrative Services or designee. To ensure the fairness of any proceedings that may follow a reported violation, the individual filing the report should not discuss or provide copies of the allegations to others.

 

Adopted 5/14/08, revised 9/17/14.