Computer Resources Acceptable Use Policy
1.Purpose
The computing resources at Tooele Technical College support the educational, instructional, and administrativeactivities of the College and the use of these resources is a privilege that is extended to members of the TooeleTech community. As a user of these services and facilities, you have access to valuable College resources, tosensitive data, and to internal and external networks. Consequently, it is important for you to behave in aresponsible, ethical, and legal manner.
In general, acceptable use means respecting the rights of other computer users, the integrity of thephysical facilities and all pertinent license and contractual agreements. If an individual is found to be inviolation of the Acceptable Use Policy, the College will take disciplinary action, including the restriction and possible loss of network privileges. A serious violation could result in more serious consequences, up to and includingsuspension or termination from the College. Individuals are also subject to federal, state and local laws governingmany interactions that occur on the Internet. These policies and laws are subject to change as state and federallaws develop and change.
This document establishes specific requirements for the use of all computing and network resources at TooeleTechnical College.
2.Scope
This policy applies to all users of computing resources owned or managed by Tooele Technical College.Individuals covered by the policy include (but are not limited to) Tooele Technical faculty and visiting faculty,staff, students, alumni, guests, external individuals, and organizations accessing network services via TooeleTechnical Colleges’ computing facilities.
Computing resources include all College owned, licensed, or managed hardware and software, and useof the College network via a physical or wireless connection, regardless of the ownership of thecomputer or device connected to the network.
These policies apply to technology administered in individual programs, the resources administered by centraladministrative departments, personally owned computers and devices connected by wire or wireless to thecampus network, and to off-campus computers that connect remotely to the College's network services.
2.1 Your Rights and Responsibilities
As a member of the College community, the College provides you with the use of educational and/or work-related tools, to certain computer systems, servers, software and databases, to the campus telephone and voicemail systems, and to the Internet. You have a reasonable expectation of unobstructed use of these tools, ofcertain degrees of privacy (which may vary depending on whether you are a College employee or student), andof protection from abuse and intrusion by others sharing these resources. You can expect your right to accessinformation and to express your opinion to be protected as it is for paper and other forms of non-electroniccommunication.
In turn, you are responsible for knowing the regulations and policies of the College that apply to appropriate use of the College's technologies and resources. You are responsible for exercising good judgment in the use of the College's technological and information resources. Just because an action is technically possible does not mean that it is appropriate to perform that action.
As a representative of the Tooele Technical College community, you are expected to respect the College's good name in your electronic dealings with those outside the College.
3. Policy
3.1 Acceptable Use
3.1.1 You may use only the computers, computer accounts, and computer files for which you have authorization.
3.1.2 You may not use another individual's account, or attempt to capture or guess other users' passwords.
3.1.3 You are individually responsible for appropriate use of all resources assigned to you, including the computer, the network address or port, software and hardware. Therefore, you are accountable to the College for all use of such resources.
3.1.4 As an authorized user of Tooele Technical College information systems, you should take reasonable measures to prevent unauthorized users to access the network or information systems, whether on a Tooele Technical College or personal device: computer, tablet, or cell phone.
3.1.5 The College is bound by its contractual and license agreements respecting certain third party resources; you are expected to comply with all such agreements when using such resources.
3.1.6 You should make a reasonable effort to protect your passwords and to secure resources against unauthorized use or access. You must configure hardware and software in a way that reasonably prevents unauthorized users from accessing Tooele Technical College’s network and computing resources.
3.1.7 You must not attempt to access restricted portions of the network, an operating system, security software or other administrative applications without appropriate authorization by the system owner or administrator.
3.1.8 You must comply with the policies and guidelines for any specific set of resources to which you have been granted access. When other policies are more restrictive than this policy, the more restrictive policy takes precedence.
3.1.9 You must not use Tooele Technical computing and/or network resources in conjunction with the execution of programs, software, processes, or automated transaction-based commands that are intended to disrupt (or that could reasonably be expected to disrupt) other computer or network users, or damage or degrade performance, software or hardware components of a system.
3.1.10 On the Tooele Technical network and/or computing systems, do not use tools that are normally used to assess security or to attack computer systems or networks (e.g., password 'crackers,' vulnerability scanners, network sniffers, etc.) unless you have been specifically authorized to do so by the Information Security Group.
3.2 Adherence with Federal, State, and Local Laws
3.2.1 As a member of the Tooele Technical College community, you are expected to uphold state and federal law. Some Tooele Technical guidelines related to use of technologies derive from that concern, including laws regarding license and copyright, and the protection of intellectual property.
3.2.2 As a user of Tooele Technical College’s computing and network resources you must:
3.2.2.1 Abide by all federal, state, and local laws.
3.2.2.2 Abide by all applicable copyright laws and licenses. Tooele Technical College has entered into legal agreements or contracts for many of our software and network resources which require each individual using them to comply with those agreements.
3.2.2.3 Observe the copyright law as it applies to music, videos, games, images, texts and other media in both personal use and in production of electronic information. The ease with which electronic materials can be copied, modified and sent over the Internet makes electronic materials extremely vulnerable to unauthorized access, invasion of privacy and copyright infringement.
3.2.2.4 Do not use, copy, or distribute copyrighted works (including but not limited to Web page graphics, sound files, film clips, trademarks, software and logos) unless you have a legal right to use, copy, distribute, or otherwise exploit the copyrighted work. Doing so may provide the basis for disciplinary action, civil litigation and criminal prosecution.
3.3 Other Inappropriate Activities
3.3.1 Use of Tooele Technical College’s computing services for the purposes of harassment
3.3.2 Use of Tooele Technical College's computing services and facilities for political purposes
3.3.3 Use of Tooele Technical College's computers for personal economic gain
3.4 Privacy, Filtering, and Personal Rights
3.4.1 All users of the College's network and computing resources are expected to respect the privacy and personal rights of others.
3.4.2 Do not access or copy another user's email, data, programs, or other files without the written permission of Tooele Technical College's Director of Information Technology.
3.4.3 Be professional and respectful when using computing systems to communicate with others; the use of computing resources to libel, slander, or harass any other person is not allowed and could lead to College discipline as well as legal action by those who are the recipient of these actions.
3.4.4 The College reserves the right to monitor or limit content of information transmitted on the campus network. Typical monitoring activities will include investigating performance deviations and system problems, determining if an individual is in violation of this policy, or, as may be necessary, to ensure that Tooele Technical is not subject to claims of institutional misconduct.
3.4.5 In order to ensure the safety and security of the school’s users, a technology protection measure is in place in order to block or filter inappropriate sites on the internet. This filtering mechanism protects against access by adults and minors to visual depictions that are obscene, child pornography, or, with respect to use of computers with internet access by minors, harmful to minors.
3.4.6 Access to files on College-owned equipment or information will only be approved by specific personnel when there is a valid reason to access those files. Authority to access user files can only come from the Director of Information Technology in conjunction with requests and/or approvals from senior Administration members of the College. External law enforcement agencies may request access to files through valid subpoenas and other legally binding requests. All such requests must be approved by the Attorney General. Information obtained in this manner can be admissible in legal proceedings or in a College hearing.
3.5 Privacy in Email and Communications
3.5.1 While every effort is made to insure the privacy of Tooele Technical College users, this may not always be possible. In addition, since employees are granted use of electronic information systems and network services to conduct College business, there may be instances when the College, based on approval from authorized officers, reserves and retains the right to access and inspect stored information without the consent of the user.
3.6 User Compliance
3.6.1 When you use College computing services, and accept any College issued computing accounts, you agree to comply with this and all other computing related policies. You have the responsibility to keep up-to-date on changes in the computing environment, as published, using College electronic and print publication mechanisms, and to adapt to those changes as necessary.
By signing below I confirm I have reviewed the Computer Resources Acceptable Use Policy and will comply with the policy.
Name ___________________________________
Signature ___________________________________
Date ___________________________________