Purpose
藏精阁 is committed to protecting electronic communications and assets. This policy articulates employee expectations regarding the use of university-owned and managed electronic communications services.
Scope
This policy applies to all faculty, staff, volunteers and individuals employed by the university that utilize the institution’s equipment, network, or systems.
Policy
Employees are responsible for the contents of their 藏精阁 email. Exempt employees, including nine- and ten-month faculty members, are expected to regularly monitor university email throughout the calendar year for work updates, student requests, and other necessary functions of the job.
All 藏精阁 employees must abide by the following Computer Use and Social Media Policy:
Revised 01/15/21
The following guidelines and rules constitute 藏精阁’s Computer Use Policy. Exceptions to these guidelines and rules require the written permission of a Dean/Division Chair and the Chief Information Officer. The violation of any of these rules or guidelines may result in termination of employment.
- Appropriate Use: Individuals who are supplied access to 藏精阁 computer facilities and to the campus-wide communications network assume responsibility for their appropriate use.
- Attachments: No one should open attachments from an unknown or questionable source as doing so can introduce damaging and costly viruses and malware into the 藏精阁 information technology infrastructure.
- Bandwidth: Providing services or running applications that consume excessive bandwidth on the 藏精阁 network is prohibited. Should such applications or services be necessary to support the mission of the University, faculty or staff must obtain approval from the Chief Information Officer prior to use.
- Commercial Use: It is prohibited to use 藏精阁’s network for commercial purposes.
- Content: Viewing, sending, or authoring obscene, profane, or harassing electronic material or messaging is prohibited, as are messages that target individuals in a threatening manner.
- Criminal Activity: No 藏精阁 system is to be used for illegal or criminal purposes.
- Email Use: The email and network systems are to be used principally for conducting 藏精阁 business. Excessive personal use—defined as exceeding 10 minutes per work day engaged in personal email communications—is not permitted. Any personal email transactions should take place only during regular work breaks, unless they are of a time-critical nature, e.g., related to a family emergency or an urgent financial or medical matter. While employees may choose to send personal email communications, they do so at their own risk and should have no expectation of privacy in any email sent over 藏精阁’s email system using University-owned computers. Please remember that deleting emails or files from a 藏精阁 email account or computer does not necessarily mean it has been erased from the University's system. All emails generated through or received by 藏精阁 email system are property of the University and subject to examination by University officials [for cause]. 藏精阁 reserves the right to inspect any messages contained within the University email system at any time.
- Email and Data Exfiltration: All 藏精阁 emails and data are considered the property of the University. As such, only limited forwarding of emails is allowed. Rules or processes that exfiltrate 藏精阁 data or emails, such as auto-forwarding, outside of the 藏精阁 Network is prohibited.
- External Domains: Users are not permitted to own external domain names that are utilized for 藏精阁 business unless otherwise approved by the user’s college dean or department AVP and the Chief Information Officer.
- Hacking: Unauthorized intrusion into, manipulation of, or theft of another’s data is prohibited.
- Intellectual Property Rights: Users must observe Intellectual Property Rights in accordance with the 藏精阁 Copyright Policy, the 藏精阁 Intellectual Property Rights Policy, and the 藏精阁 Information Technology Acceptable Use Policy (see appendices below).
- Legal Compliance: 藏精阁 employees are prohibited from sending or knowingly downloading software or data that violate local ordinances or state or federal laws.
- Mailing Lists: The use of 藏精阁 email accounts for non-business mailing list subscriptions is prohibited.
- O365 Account and Data Retention: In most instances account email and data are retained for no longer than 30 days after employment ends.
- Outlook: 藏精阁 business conducted via email should be limited to the user’s 藏精阁 Outlook account. Personal email accounts should not be used to transmit 藏精阁 communications and materials.
- Passwords: Users must not disclose their passwords or otherwise make 藏精阁 facilities available to unauthorized individuals. Moreover, the possession or collection of other’s passwords is prohibited.
- Personal Accounts: Individuals assume responsibility for their personal, non-university accounts.
- Personal Devices: Users with personal devices on the 藏精阁 network are expected to take reasonable precautions to ensure the security of their systems and will be held responsible for misuse by others.
- Personal/Political Messaging: Broadcasting personal or political messages to either ad hoc or preconfigured distribution groups, internal or external to the University, is prohibited.
- Policy Application: The 藏精阁 University Email Responsibility, Computer Use, and Social Media Policy applies to all computers, mobile devices, and other technology devices connected to the 藏精阁 network, whether they are personal or University-owned.
- Property: Statutes governing intellectual property rights will supersede the University’s prerogatives in the case of copyrighted materials.
- Purpose: Computer and network facilities are provided primarily for educational and administrative use.
- Restrictions: At its discretion, 藏精阁 reserves the right to restrict or deny the use of its network and services.
- Secondary Networks: It is prohibited to connect any secondary physical network to the 藏精阁 network without written authorization of the Chief Information Officer.
- Security: Individuals may not attempt to circumvent security systems or to exploit or probe for security holes in any 藏精阁 network or system, nor may individuals attempt any such activity against other systems accessed through 藏精阁 properties.
- Theft: Theft, rearrangement, or damage to any University computer or network equipment, facilities, or property is strictly prohibited and will be reported to the police. This includes all audio-video equipment, computer labs, classrooms, network equipment, wiring, and circuits.
- User Privilege: The use of technology on campus is a privilege, rather than a right, and a violation of the aforementioned policies could result in a suspension of network privileges and/or employment action up to or including termination of employment.