The Office of Information Technology oversees the college’s technology concerns and is responsible for creating and enforcing policies and procedures to ensure college information remains as secure as possible. Additional information is available on the ITS page of the uedbet体育官网 website. The following guidelines have been established for all employees using uedbet体育官网 technology:
1. uedbet体育官网 email and other provided resources are not private or confidential. All uedbet体育官网 provided technology as well as data stored on or transmitted over uedbet体育官网 resources, belongs to the uedbet体育官网. While uedbet体育官网 uedbet体育官网 does not routinely monitor an individual’s electronic data or network usage, the uedbet体育官网 may monitor, examine, regulate, any data located on or accessed via uedbet体育官网 provided resources, without the permission of the user. While uedbet体育官网 uedbet体育官网 does not routinely monitor the contents of email, the contents of any user’s private directories, and Internet usage, all college-supplied technology belongs to the uedbet体育官网. With a user’s verbal or written permission, ITS staff may or the uedbet体育官网 may access email or files in a user’s private directories for diagnostic purposes without the permission of the user. However, if asked by the appropriate authorities (for example: Dean’s Office, Security, or law enforcement), we reserve the right to do so.
Many software systems are designed to collect usage information and to log user activity. The college routinely aggregates the data stored in these logs for analytical purposes. In general, the college does not attempt to extract from the logs data regarding the activity of individual users. The college does, however, reserve the right to do so.
2. Disparaging, abusive, profane or offensive language; materials that would adversely or negatively reflect upon the college or be contrary to the college’s best interests; and any illegal activities—including piracy, hacking, extortion, blackmail, copyright infringement and unauthorized access to any systems, data or technology—are forbidden.
3. Copyrighted materials may not be utilized by employees on any college equipment without the express permission of the owner of the copyright as well as proper citation of source. All employees obtaining access to other companies’ or individuals’ materials must respect all copyrights and may not copy, retrieve, modify or forward copyrighted materials, except with permission or as a single copy to reference only. Faculty should consult with the copyright policy which more clearly outlines permissible uses of materials.
4. Employees are responsible for the content of all text, audio or images that they place or send over the college’s network system. No email, or other electronic communications, may be sent which hides the identity of the sender or represents the sender as someone else. The college’s name is attached to all messages, so employees should use discretion in formulating messages.
5. Internal and external email messages are considered business records and may be subject to discovery in the event of litigation. Employees should be aware of this possibility when sending email within and outside the college.