IT 004 - Acceptable Use Policy INFORMATION TECHNOLOGY POLICY: Acceptable Use Policy
I. Scope
This policy applies to all faculty, staff, and students of the Seton Hill University Community and as well to any person or entity that is unaffiliated with the University who seeks to gain access to Information Technology services at Seton Hill University.
II. Purpose
The policy provides the use guidelines when utilizing Seton Hill computer and network systems.
III. General Policy
Network and Internet services at Seton Hill University have been established to promote educational excellence by facilitating resource sharing, innovation, and communication. Maintaining these computing services depends upon proper conduct of end users. Seton Hill users are held to high ethical standards consistent with the Mission Statement of our University. These standards also underscore responsible, legal, and secure use of the campus-wide information system, and are indicative of common sense and common decency applicable to any shared resource. Responsibility extends to access, use of information, and distribution of data.
All technology equipment and communication systems provided by Seton Hill University are considered to be University property and used for business and academic purposes only. Workplace systems are designed with security protections appropriate to that kind of communication. Employee work-related communications are not to be forwarded to any personal account. Employees are discouraged from using or syncing their personal accounts with or onto University equipment. All communications and/or information created, stored, received, sent or transmitted on or through provided University technology, including over the Internet, intranet, email, servers, computers, tablets, hardware and software, and other electronic communications services, are considered University property.
All users should understand that the University reserves the right to monitor, review, intercept, access and disclose all Internet usage on our network, work email communications sent or received, and all work cell phones, computers, and tablet usage. Users of these resources are accountable for their actions in accordance with this policy and any applicable federal, state, or local laws.
Student network accounts are created for students upon receipt of admissions deposit to the institution and retained throughout the students’ career at Seton Hill University. Student network accounts are constantly reviewed. Accounts for students who have not been registered for the prior 3 semesters are removed from our system. Access to any University computer systems resources will be removed at this time. Upon graduation students will be allotted 1 year to transition their account after which the network account and all University computer systems resources will be removed.
Faculty and Staff accounts are created upon request from Human Resources. Faculty and Staff accounts are disabled upon termination. Emerita/Emeritus Faculty are entitled to retain their email and cloud storage accounts. Any extension to Faculty and Staff accounts must have prior approval from Human Resources.
Seton Hill accounts provide access, which varies depending on user needs, to resources including but not limited to; email, departmental and personal network drive space, the campus Intranet, the campus portal and library resources. It is mandatory that all employees of the Seton Hill community enroll in our Two-Factor Authentication service to protect our resources. Seton Hill’s Two-Factor Authentication service provides a second layer of protection to a user’s digital identity, as well adding protection to data, systems, and services.
The Information Technology (IT) Department is responsible for ensuring that all computers and peripheral hardware, printers, telephone system equipment, and all related software is compatible with University standards and network requirements. All University-funded purchasing requests for such items must be routed through the IT department before a purchase order is issued. IT maintains University-purchased equipment and software inventory databases, and archives all software media and
licenses. IT personnel are also responsible for installing all new information technology hardware and software, and for moving such items to different campus locations or to different computers.
IV. Conditions of Use
Access to the Seton Hill University computer system, including Internet connectivity, is contingent on appropriate use. Any information, data, or programs not aligned with the mission of Seton Hill University must not be created, stored, transmitted, viewed, or manipulated using Seton Hill computing and network resources. Inappropriate use may, at the discretion of University Administration, result in the suspension and or cancelation of network and computing service privileges. See Prohibited usage on page 3.
Prohibited usage includes, but is not limited to
- Transmission of any material in violation of any federal, state, or local regulation is prohibited. This includes, but is not limited to: copyrighted material, threatening, harassing, or obscene material, or material protected by trade secret laws.
- Transmitting or accessing information containing harassing material. Computer harassment includes, but is not limited to:
- Text images with the intent to harass, terrify, intimidate, threaten, or offend another person.
- Intentionally using the computer to contact another person repeatedly with the intent to harass or bother, whether or not any actual message is communicated, and/or where no purpose of legitimate communication exists, and where the recipient has expressed a desire for the communication to cease.
- Intentionally using the computer to disrupt or damage the academic, research, administrative, or related pursuits of another.
- Intentionally using the computer to invade the privacy, academic or otherwise, of another or the threatened invasion of the privacy of another.
- Transmitting, receiving, displaying, or viewing offensive content, which includes, but is not limited to; sexual comments or images, racial slurs, gender specific comments, or any comments that would offend someone on the basis of their age, sex, national origin, or disability. Displaying, sending, printing, or storing sexually explicit, graphically disturbing, obscene, pornographic, fraudulent, harassing, threatening, abusive, racist, or discriminatory images, files, or messages in any campus computing facility or any campus location.
- Disseminating or printing copyrighted materials, including computer files, articles, and software, in violation of copyright laws.
- Attempting forgery of email messages.
- Physical or electronic interference with other computer systems users.
- Any other practice or user activity that, in the opinion of Information Technology management, constitutes irresponsible behavior, promotes illegal activities, results in the misuse of computer resources, or jeopardizes the operation of computer or network systems.
- Bringing actual or potential embarrassment or harm to the University.
- Use of the Internet to access pornographic material is prohibited.
- Any social media use with Seton Hill accounts that is unrelated to an employee’s duties and responsibilities is prohibited. Personal social media accounts should not be linked to Seton Hill University email accounts.
- Downloading, distributing or printing copyrighted materials, which include articles, software or intellectual property, in violation of the copyright laws or licensing agreements.
- Spamming email accounts or forwarding chain letters.
- Disclosing confidential information or otherwise violating the privacy rights of the University or its employees, citizens or business associates.
- Vandalizing data of another user, including uploading or creating computer viruses.
- Other uses as determined by the University.
V. Consequences
Any violation of these conditions is unethical and may potentially lead to civil or criminal action. Rights to all individual accounts are non-transferable. If Information Technology or other Academic or Administrative employees suspect that any of these conditions are being violated, they will initiate an investigation through the appropriate agency on campus. During the investigation, the account in question and all computing services may be suspended. If a breach of the conditions is confirmed, the user may face disciplinary review and/or possible legal action. Seton Hill University cannot and will not extend protection to a user who violates the policies of an external network.
VI. Questions and Interpretation
All questions concerning this policy should be directed to the Policy Administrator/Owner at policies@setonhill.edu.
Add to Portfolio (opens a new window)
|