Purpose
Ä¢¹½ÊÓÆµ University is committed to protecting electronic communications and assets. This policy articulates employee expectations regarding the use of university-owned and managed electronic communications services.
Scope
This policy applies to all faculty, staff, volunteers and individuals employed by the university that utilize the institution’s equipment, network, or systems.
Policy
Employees are responsible for the contents of their Ä¢¹½ÊÓÆµ University email. Exempt employees, including nine- and ten-month faculty members, are expected to regularly monitor university email throughout the calendar year for work updates, student requests, and other necessary functions of the job.
All Ä¢¹½ÊÓÆµ employees must abide by the following Computer Use and Social Media Policy:
Revised 01/15/21
The following guidelines and rules constitute Ä¢¹½ÊÓÆµ University’s Computer Use Policy. Exceptions to these guidelines and rules require the written permission of a Dean/Division Chair and the Chief Information Officer. The violation of any of these rules or guidelines may result in termination of employment.
- Appropriate Use: Individuals who are supplied access to Ä¢¹½ÊÓÆµ University computer facilities and to the campus-wide communications network assume responsibility for their appropriate use.
- Attachments: No one should open attachments from an unknown or questionable source as doing so can introduce damaging and costly viruses and malware into the Ä¢¹½ÊÓÆµ University information technology infrastructure.
- Bandwidth: Providing services or running applications that consume excessive bandwidth on the Ä¢¹½ÊÓÆµ University network is prohibited. Should such applications or services be necessary to support the mission of the University, faculty or staff must obtain approval from the Chief Information Officer prior to use.
- Commercial Use: It is prohibited to use Ä¢¹½ÊÓÆµ University’s network for commercial purposes.
- Content: Viewing, sending, or authoring obscene, profane, or harassing electronic material or messaging is prohibited, as are messages that target individuals in a threatening manner.
- Criminal Activity: No Ä¢¹½ÊÓÆµ University system is to be used for illegal or criminal purposes.
- Email Use: The email and network systems are to be used principally for conducting Ä¢¹½ÊÓÆµ University business. Excessive personal use—defined as exceeding 10 minutes per work day engaged in personal email communications—is not permitted. Any personal email transactions should take place only during regular work breaks, unless they are of a time-critical nature, e.g., related to a family emergency or an urgent financial or medical matter. While employees may choose to send personal email communications, they do so at their own risk and should have no expectation of privacy in any email sent over Ä¢¹½ÊÓÆµ University’s email system using University-owned computers. Please remember that deleting emails or files from a Ä¢¹½ÊÓÆµ University email account or computer does not necessarily mean it has been erased from the University's system. All emails generated through or received by Ä¢¹½ÊÓÆµ University email system are property of the University and subject to examination by University officials [for cause]. Ä¢¹½ÊÓÆµ University reserves the right to inspect any messages contained within the University email system at any time.
- Email and Data Exfiltration: All Ä¢¹½ÊÓÆµ University emails and data are considered the property of the University. As such, only limited forwarding of emails is allowed. Rules or processes that exfiltrate Ä¢¹½ÊÓÆµ data or emails, such as auto-forwarding, outside of the Ä¢¹½ÊÓÆµ Network is prohibited.
- External Domains: Users are not permitted to own external domain names that are utilized for Ä¢¹½ÊÓÆµ University business unless otherwise approved by the user’s college dean or department AVP and the Chief Information Officer.
- Hacking: Unauthorized intrusion into, manipulation of, or theft of another’s data is prohibited.
- Intellectual Property Rights: Users must observe Intellectual Property Rights in accordance with the Ä¢¹½ÊÓÆµ University Copyright Policy, the Ä¢¹½ÊÓÆµ University Intellectual Property Rights Policy, and the Ä¢¹½ÊÓÆµ University Information Technology Acceptable Use Policy (see appendices below).
- Legal Compliance: Ä¢¹½ÊÓÆµ University employees are prohibited from sending or knowingly downloading software or data that violate local ordinances or state or federal laws.
- Mailing Lists: The use of Ä¢¹½ÊÓÆµ University email accounts for non-business mailing list subscriptions is prohibited.
- O365 Account and Data Retention: In most instances account email and data are retained for no longer than 30 days after employment ends.
- Outlook: Ä¢¹½ÊÓÆµ University business conducted via email should be limited to the user’s Ä¢¹½ÊÓÆµ University Outlook account. Personal email accounts should not be used to transmit Ä¢¹½ÊÓÆµ University communications and materials.
- Passwords: Users must not disclose their passwords or otherwise make Ä¢¹½ÊÓÆµ University facilities available to unauthorized individuals. Moreover, the possession or collection of other’s passwords is prohibited.
- Personal Accounts: Individuals assume responsibility for their personal, non-university accounts.
- Personal Devices: Users with personal devices on the Ä¢¹½ÊÓÆµ University network are expected to take reasonable precautions to ensure the security of their systems and will be held responsible for misuse by others.
- Personal/Political Messaging: Broadcasting personal or political messages to either ad hoc or preconfigured distribution groups, internal or external to the University, is prohibited.
- Policy Application: The Ä¢¹½ÊÓÆµ University University Email Responsibility, Computer Use, and Social Media Policy applies to all computers, mobile devices, and other technology devices connected to the Ä¢¹½ÊÓÆµ University network, whether they are personal or University-owned.
- Property: Statutes governing intellectual property rights will supersede the University’s prerogatives in the case of copyrighted materials.
- Purpose: Computer and network facilities are provided primarily for educational and administrative use.
- Restrictions: At its discretion, Ä¢¹½ÊÓÆµ University reserves the right to restrict or deny the use of its network and services.
- Secondary Networks: It is prohibited to connect any secondary physical network to the Ä¢¹½ÊÓÆµ University network without written authorization of the Chief Information Officer.
- Security: Individuals may not attempt to circumvent security systems or to exploit or probe for security holes in any Ä¢¹½ÊÓÆµ University network or system, nor may individuals attempt any such activity against other systems accessed through Ä¢¹½ÊÓÆµ University properties.
- Theft: Theft, rearrangement, or damage to any University computer or network equipment, facilities, or property is strictly prohibited and will be reported to the police. This includes all audio-video equipment, computer labs, classrooms, network equipment, wiring, and circuits.
- User Privilege: The use of technology on campus is a privilege, rather than a right, and a violation of the aforementioned policies could result in a suspension of network privileges and/or employment action up to or including termination of employment.