Technology Acceptable Use Policy

Assumption College Policies:

Technology Acceptable Use Policy
Network Use Policy

Computer Software Policy
HEOA Compliance Statement & Policy

ASSUMPTION COLLEGE TECHNOLOGY ACCEPTABLE USE POLICY

Purpose

Information Technology & Media Services (IT&MS) at Assumption College supports the educational, institutional, and administrative activities of the College. The use of these resources is restricted to members of the Assumption College community. As a user of these resources, you have access to College resources, to sensitive data, and to internal and external networks. Consequently, it is important for you to behave in a responsible, ethical, and legal manner.

In general, acceptable use means respecting the rights of all computer users, the integrity of the campus facilities and all pertinent license and contractual agreements. If an individual is found to be in violation of the Acceptable Use Policy, the College may take disciplinary action, including the restriction and possible loss of network privileges. A serious violation could result in more serious consequences, up to and including suspension or expulsion from Assumption College. Individuals are also subject to federal, state and local laws governing interactions that may occur on the Internet. These policies and laws are subject to change as state and federal laws develop and change.

This document establishes specific requirements for the use of all computer and network resources at Assumption College.

Scope

This policy is directed at all users of computer and network resources owned or managed by Assumption College. Individuals covered by the policy include (but are not limited to) Assumption faculty and visiting faculty, staff, students, alumni, or guests of the administration, external individuals, and organizations accessing network services via Assumption’s computing facilities.

Computing resources include all College owned, licensed, or managed hardware and software, and use of the College network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network.

These policies apply to technology administered in individual departments, the resources administered by IT&MS, personally owned computers, tablets and/or (smart)phones and devices connected by wired or wireless to the campus network, and to off-campus remote computers that connect to the College’s network services through VPN.

Rights and Responsibilities

As a member of Assumption College, the college provides you with the use of computing and work-related resources, including access to the Library, computer systems, servers, software and databases, to the campus telephone and voice mail systems, and to the Internet. You have a reasonable expectation of unobstructed use of these tools, of certain degrees of privacy and of protection from abuse and intrusion by others sharing these resources.

In turn, you are responsible for knowing the regulations and policies of the College that apply to appropriate use of the College's technologies and resources. You are responsible for exercising good judgment in the use of Assumption College’s technological and information resources.

Acceptable Use

  • You may use only the computers, computer accounts, and computer files for which you have authorization.
  • You may not use another individual's account, or attempt to capture or guess other users' passwords.
  • You are individually responsible for appropriate use of all resources assigned to you, including the computer, software and hardware. Therefore, you are accountable to the College for all use of such resources. As an authorized Assumption College user of resources, you may not enable unauthorized users to access the network by using an Assumption computer or a personal computer that is connected to the Assumption network.
  • The College is bound by its contractual and license agreements respecting certain third party resources; you are expected to comply with all such agreements when using such resources.
  • You should make a reasonable effort to protect your passwords and to secure resources against unauthorized use or access. You must configure hardware and software in a way that reasonably prevents unauthorized users from accessing Assumption's network and computing resources.
  • You must not attempt to access restricted portions of the network, an operating system, security software or other administrative applications without appropriate authorization by the system owner or administrator.
  • You must not use Assumption College computing and/or network resources in conjunction with the execution of programs, software, processes, or automated transaction-based commands that are intended to disrupt (or that could reasonably be expected to disrupt) other computer or network users, or damage or degrade performance, software or hardware components of a system.
  • On Assumption College’s network and/or computing systems, do not use tools that are normally used to assess security or to attack computer systems or networks (e.g., password 'crackers,' vulnerability scanners, network sniffers, etc.)

Assumption College Computing is a Shared Resource

IT&MS expects to maintain an acceptable level of performance and must assure that unintended, excessive, or inappropriate use of the resources by one individual or a few does not negatively impact performance for others. The campus network, including RESnet, computer servers, mail  and other central computing resources are shared widely and are limited, requiring that resources be utilized with consideration for others who also use them.

Assumption College may choose to set limits on an individual's use of a resource through quotas, time limits, and other mechanisms to ensure that these resources can be used by anyone who needs them. Monitoring is in place to determine the proper use of college resources.

Adherence to Federal, State, and Local Laws

As a user of Assumption College computing and network resources you must:

  • Abide by all federal, state, and local laws.
  • Abide by all applicable copyright laws and licenses. Assumption College has entered into legal agreements or contracts for many of our software and network resources which require each individual using them to comply with those agreements.
  • Observe the copyright law as it applies to music, videos, games, images, texts and other media in both personal use and in creation of electronic information. The ease with which electronic materials can be copied, modified and sent over the Internet makes electronic materials extremely vulnerable to unauthorized access, invasion of privacy and copyright infringement.
  • Do not use, copy, or distribute copyrighted works. Doing so may provide the basis for disciplinary action, civil litigation and criminal prosecution.

Inappropriate Activities

Use Assumption College computing facilities and services for those activities that are consistent with the educational, research and mission of the College. Do NOT use college computing resources for political or personal economic gain. Do NOT use the campus computing facility in a way that would jeopardize the school’s tax-exempt status.

Privacy and Personal Rights

  • All users of Assumption College computer and network resources are expected to respect the privacy and personal rights of others.
  • Be professional and respectful when using computing systems to communicate with others; the use of computing resources to libel, slander, or harass any other person is not allowed and could lead to College discipline as well as legal action by those who are the recipient of these actions.

While Assumption College does not generally limit the content of information transmitted on the campus network, monitoring of College computing systems is ongoing. The College reserves the right to access and review such information under certain conditions. These include: investigating performance deviations and system problems (with reasonable cause), determining if an individual is in violation of this policy, or, as may be necessary, ensuring that Assumption College is not subject to claims of institutional misconduct.

Access to files on College-owned equipment or information by security officials, IT&MS or other pertinent College offices will only be approved by specific personnel when there is a valid reason to access those files. Authority to access user files can only come from the Executive Director of IT&MS in consultation with the Provost and the General Counsel. External law enforcement agencies and Public Safety may request access to files through valid subpoenas and other legally binding requests. All such requests must be approved by the General Counsel. Information obtained in this manner can be admissible in legal proceedings or in an Assumption College hearing.

Privacy in Email

While every effort is made to ensure the privacy of Assumption College email users, this may not always be possible. Assumption College reserves and retains the right to access and inspect stored information without the consent of the user.

User Compliance

When you use Assumption College computing services, and accept any College issued computer accounts, you agree to comply with this and all other computing related policies. You have the responsibility to keep up-to-date on changes in the computing environment, as published via Assumption College electronic and print publication mechanisms, and to adapt to those changes as necessary.