Information Technology Policy
Information Technology Acceptable Use
SECTION ONE - PURPOSE
A. To remain competitive, better serve and provide our employees with the best tools to do their work, Cisco College makes available access to one or more forms of electronic media and services, which may include computers, e-mail, databases, software, telephones, voicemail, fax machines, external electronic bulletin boards, wire services, online services, intranet, and the Internet.
B. Cisco College encourages the use of these media and associated services because they can make communication more efficient and effective and because they are valuable sources of information. However, everyone connected with the college should remember that electronic media and services provided by the college are college property and their purpose is to facilitate and support school business. All computer users have the responsibility to use these resources in a professional, ethical, and lawful manner.
C. To help all employees make responsible decisions, the following guidelines have been established for using information resources. No policy can lay down rules to cover every possible situation. Instead, it is designed to express Cisco College philosophy and set forth general principles when using electronic media and services.
SECTION TWO - PROHIBITED COMMUNICATIONS
Electronic media cannot be used for knowingly transmitting, retrieving, or storing any communication that is:
1. Discriminatory or harassing
2. Derogatory to any individual or group
3. Obscene, sexually explicit or pornographic
4. Defamatory or threatening
5. In violation of any license governing the use of software
6. Engaged in for any purpose that is illegal or contrary to Cisco College’s policy or business interests
7. For product advertisement or political lobbying.
SECTION THREE - PERSONAL USE
The computers, electronic media and services provided to employees by Cisco College are primarily for work related purposes. Limited, occasional, or incidental use of electronic media (sending or receiving) for personal purposes is understandable and acceptable, and all such use should be done in a manner that does not negatively affect the systems' use for their intended purposes, the employee’s job performance or the college budgets. Employees are expected to demonstrate a sense of responsibility and not abuse this privilege. See section four for additional information.
SECTION FOUR - ACCESS TO EMPLOYEE COMMUNICATIONS
A. Generally, electronic information created and/or communicated by an employee using e-mail, word processing, utility programs, spreadsheets, voicemail, telephones, Internet,and similar electronic media is not reviewed by the college. However, the following conditions should be noted:
Cisco College does routinely gather logs for most electronic activities and monitor communications directly, e.g., sites accessed, upload/download content, and time at which transfers are made, for the following purposes:
1. Cost analysis
2. Resource allocation
3. Optimum technical management of information resources
4. Detecting patterns of use that indicate users are violating college policies or engaging in illegal activity
B. Cisco College reserves the right, at its discretion, to review any employee’s electronic files and messages to the extent necessary to ensure electronic media and services are being used in compliance with the law, this policy and other college policies.
C. Employees should not assume electronic communications are completely private. Accordingly, if they have sensitive information to transmit, they should use other means.
SECTION FIVE - SOFTWARE
To prevent computer viruses from being transmitted through the school's computer system, unauthorized downloading of any unauthorized software is strictly prohibited. Only software registered through Cisco College may be downloaded. Employees should contact the Helpdesk if they have any questions.
SECTION SIX - SECURITY/APPROPRIATE USE
A. Access to Information Technology Resources is granted according to role based needs by appropriate administrators.
B. Employees must respect the confidentiality of other individuals' electronic communications. Except in cases in which explicit authorization has been granted by school administration, employees are prohibited from engaging in, or attempting to engage in:
1. Monitoring or intercepting the files or electronic communications of other employees or third parties
2. Hacking or obtaining access to systems or accounts they are not authorized to use
3. Using other people's log-ins or passwords
4. Breaching, testing, or monitoring computer or network security measures.
B. No e-mail or other electronic communications can be sent that attempt to hide the identity of the sender or represent the sender as someone else.
C. Electronic media and services should not be used in a manner that is likely to cause network congestion or significantly hamper the ability of other people to access and use the system.
D. Anyone obtaining electronic access to other companies' or individuals' materials must respect all copyrights and cannot copy, retrieve, modify or forward copyrighted materials except as permitted by the copyright owner. Respect for the intellectual work of others has traditionally been essential to the mission of colleges and universities. We do not tolerate plagiarism, and we do not condone unauthorized copying of software, including programs, applications, databases and code.
SECTION SEVEN - PARTICIPATION IN ONLINE FORUMS
A. Employees should remember that any messages or information sent on school-provided facilities to one or more individuals via an electronic network—for example, Internet mailing lists, and online services—are statements identifiable and attributable to Cisco College.
B. Cisco College recognizes that participation in some forums might be important to the performance of an employee’s job functions and/or professional responsibilities.
SECTION EIGHT - VIOLATIONS
Any employee who abuses the privilege of their access to e-mail or the Internet in violation of this policy will be subject to corrective action, including possible termination, legal action, and criminal liability.