(A) User access.
The college operates and maintains technology resources to
facilitate achievement of its missions and goals. Access to technology
resources is a privilege granted to users, but is not a right. Access may be
denied, and technology resources may be seized, at any time and without notice.
Every user is subject to this procedure, and other applicable policies and
procedures of the college.
(B) Prohibited user behavior.
(1) Using technology resources to violate, or
while violating, any law or college policy or procedure.
(2) Accessing or attempting to access any
technology resource without proper authorization from the technology systems
and resources ("TSR") department; or using any technology resource to access or
attempt to access any other party's technology resource without proper
authorization.
(3) Using technology
resources to access, display, transmit, or store obscene or pornographic
materials or communications.
(4)
Interfering or attempting to interfere with the operation of any technology
resource, or with any user's use or access.
(5) Sharing without prior TSR authorization
any username, password, or other access security method; or using or
facilitating the use of any/technology resource that is subject to any access
restriction without prior TSR authorization.
(6) Using any technology resource to send any
communication using a false name, or using any other method that suggests
another individual is the sender.
(7) Using any technology resource in a manner
inconsistent with contractual obligations or other legal restrictions
applicable to the college.
(8)
Using/technology resources in such a way as to appear to express the views of
the college (except to the extent one is properly authorized to do
so).
(9) Knowingly or intentionally
introducing any bugs, viruses, worms, or other "malicious software" to
technology resources; or knowingly or intentionally using technology resources
to propagate any bugs, viruses, worms, or other "malicious software."
(C) No expectation of privacy.
Users should not have an expectation of privacy in anything
they create, store, send, or receive using technology resources. Users should
be aware that communications and other information sent or received through
technology resources may not remain confidential while in transit or while
stored on the sending or receiving technology resources. The college reserves
the right, with or without notice, to monitor, access, and record all user
activities involving technology resources.
The college monitors and records all user internet activity.
Periodically, this activity is analyzed for individuals' violations of college
policies and procedures. (At any time, users may obtain a list of internet
activity associated with their account by submitting a request to the vice
president of TSR.) The normal operation and maintenance of technology resources
generally includes the backup and caching of data and communications, the
logging of activity, the monitoring of general usage patterns, and other
activities.
The college may also specifically monitor and record the
activity and accounts of individual users of technology resources, including
individual login sessions, communications, and any other activities, without
notice, when (a)
(1) the user has voluntarily made them accessible to
the public, as by posting to usenet or a web page; (b)
(2) it reasonably
appears necessary to do so to protect the integrity, security, or functionality
of College or other Technology Resources or to protect the college from
liability; (c)
(3) reasonable cause exists supporting the belief that
the User has violated, or is violating, college policy or procedure;
(d)
(4) a
user account appears to be engaged in unusual or unusually excessive activity,
as indicated by the monitoring of general activity and usage patterns; or
(e)
(5) when
such monitoring or recording is otherwise required or permitted by law.
Individually-targeted monitoring described in paragraph
(b) through (e) must be authorized in
advance by the vice president of TSR, vice president of human resources, or the
college president.
The college, in its discretion, may disclose the results of any
such general or individual monitoring, including the contents and records of
individual communications, to appropriate college personnel or law enforcement
agencies and may use those results in appropriate College disciplinary
proceedings. Communications and other information transmitted or stored using
technology resources may also be subject to disclosure under Ohio's public
records laws.
(D)
Installation of software and connection of devices.
Only TSR may install software on technology resources, or
connect any device to Technology Resources. Any user who connects a device or
installs software in violation of the foregoing does so at the User's own risk,
and the College may hold such Users responsible for any associated costs,
claims, losses, or liabilities. Devices connected or software installed by
anyone other than TSR will not be supported by the College, and may be removed
by the College at any time without notice and without any liability for any
damages whatsoever to any party.
(E) Violations.
Violation of this procedure may result in sanctions up to and
including: immediate and permanent termination of access privileges; and civil
or criminal legal action by the College, law enforcement organizations, and
injured third parties. In addition, students, faculty, and staff may be subject
to disciplinary actions described in other applicable college policies and
procedures.
(F) Notices and
disclaimers.
(1) The college may restrict or
terminate user access at any time, without notice, and with or without any
reason.
(2) Users are solely
responsible for backing up their own files. Failure to do so may result in
damage or complete loss of files and all associated information.
(3) The college disclaims any and all
representations or warranties, expressed or implied, about the Technology
resources' quality; effectiveness; safety; fitness for any purpose; and lack of
errors, viruses, worms, or other "malicious software."
(4) The college is not responsible for
offensive or illegal material which may be accidentally or intentionally sent,
received, or displayed while using computers or networks belonging to the
institution.
(5) The college is not
responsible for damaged, lost, unavailable or stolen data, intellectual
property, or other real property resulting from or occurring while using
technology Resources.
(6) The
availability of technology resources is not guaranteed to any extent
whatsoever.
(7) Technology
resources sometimes link to or contain materials generated or posted by college
departments, organizations, students, employees, or others. Such materials do
not necessarily represent the official views of the college.
(8) The college does not assume any
responsibility or risk for user's use of the Internet. The College does not
operate, control or endorse any information, products or services on the
Internet in any way.
(9) Users
should avoid personal uses of technology resources that result in any charge to
the college. Users must promptly identify all such charges to the college, and
promptly provide full reimbursement.
(G) Capitalized terms not defined in this
procedure shall have the meaning given to them in the technology resource
policy.
(H) The college president
hereby designates the executive vice president of Administration or that
person's designee to take all steps necessary and appropriate for implementing
this procedure.
Effective date: April 28,
2005
Procedure amplifies:
3354:1-50-05
Replaces: part of
3354:1-50-05