(A) User access.
The college operates and maintains technology
resources to facilitate achievement of its missions and goals. Access to
technology resources is a privilege granted to users, but is not a right.
Access may be denied, and technology resources may be seized, at any time and
without notice. Every user is subject to this procedure, and other applicable
policies and procedures of the college.
(B) Prohibited user
behavior.
(1) Using technology
resources to violate, or while violating, any law or college policy or
procedure.
(2) Accessing or
attempting to access any technology resource without proper authorization from
the technology systems and resources ("TSR") department; or using any
technology resource to access or attempt to access any other party's
technology resource without proper authorization.
(3) Using technology
resources to access, display, transmit, or store obscene or pornographic
materials or communications.
(4) Interfering or
attempting to interfere with the operation of any technology resource, or with
any user's use or access.
(5) Sharing without prior
TSR authorization any username, password, or other access security method; or
using or facilitating the use of any technology resource that is subject to any
access restriction without prior TSR authorization.
(6) Using any technology
resource to send any communication using a false name, or using any other
method that suggests another individual is the sender.
(7) Using any technology
resource in a manner inconsistent with contractual obligations or other legal
restrictions applicable to the college.
(8) Using technology
resources in such a way as to appear to express the views of the college
(except to the extent one is properly authorized to do so).
(9) Knowingly or
intentionally introducing any bugs, viruses, worms, or other "malicious
software" to technology resources; or knowingly or intentionally using
technology resources to propagate any bugs, viruses, worms, or other
"malicious software."
(C) No expectation of
privacy.
Users should not have an expectation of privacy
in anything they create, store, send, or receive using technology resources.
Users should be aware that communications and other information sent or
received through technology resources may not remain confidential while in
transit or while stored on the sending or receiving technology resources. The
college reserves the right, with or without notice, to monitor, access, and
record all user activities involving technology resources.
The college monitors and records all user
internet activity. Periodically, this activity is analyzed for
individuals' violations of college policies and procedures. (At any time,
users may obtain a list of internet activity associated with their account by
submitting a request to the vice president of TSR.) The normal operation and
maintenance of technology resources generally includes the backup and caching
of data and communications, the logging of activity, the monitoring of general
usage patterns, and other activities.
The college may also specifically monitor and
record the activity and accounts of individual users of technology resources,
including individual login sessions, communications, and any other activities,
without notice, when (1) the user has voluntarily made them accessible to the
public, as by posting to usenet or a web page; (2) it reasonably appears
necessary to do so to protect the integrity, security, or functionality of
college or other technology resources or to protect the college from liability;
(3) reasonable cause exists supporting the belief that the user has violated,
or is violating, college policy or procedure; (4) a user account appears to be
engaged in unusual or unusually excessive activity, as indicated by the
monitoring of general activity and usage patterns; or (5) when such monitoring
or recording is otherwise required or permitted by law. Individually-targeted
monitoring described in this paragraph must be authorized in advance by the
vice president of TSR, vice president of human resources, or the college
president.
The college, in its discretion, may disclose the
results of any such general or individual monitoring, including the contents
and records of individual communications, to appropriate college personnel or
law enforcement agencies and may use those results in appropriate college
disciplinary proceedings. Communications and other information transmitted or
stored using technology resources may also be subject to disclosure under
Ohio's public records laws.
(D) Installation of software and
connection of devices.
Only TSR may install software on technology
resources, or connect any device to technology resources. Any user who connects
a device or installs software in violation of the foregoing does so at the
user's own risk, and the college may hold such users responsible for any
associated costs, claims, losses, or liabilities. Devices connected or software
installed by anyone other than TSR will not be supported by the college, and
may be removed by the college at any time without notice and without any
liability for any damages whatsoever to any party.
(E) Violations.
Violation of this procedure may result in
sanctions up to and including: immediate and permanent termination of access
privileges; and civil or criminal legal action by the college, law enforcement
organizations, and injured third parties. In addition, students, faculty, and
staff may be subject to disciplinary actions described in other applicable
College policies and procedures.
(F) Notices and disclaimers.
(1) The college may
restrict or terminate user access at any time, without notice, and with or
without any reason.
(2) Users are solely
responsible for backing up their own files. Failure to do so may result in
damage or complete loss of files and all associated information.
(3) The college disclaims
any and all representations or warranties, expressed or implied, about the
technology resources' quality; effectiveness; safety; fitness for any
purpose; and lack of errors, viruses, worms, or other "malicious
software."
(4) The college is not
responsible for offensive or illegal material which may be accidentally or
intentionally sent, received, or displayed while using computers or networks
belonging to the institution.
(5) The college is not
responsible for damaged, lost, unavailable or stolen data, intellectual
property, or other real property resulting from or occurring while using
technology resources.
(6) The availability of
technology resources is not guaranteed to any extent whatsoever.
(7) Technology resources
sometimes link to or contain materials generated or posted by college
departments, organizations, students, employees, or others. Such materials do
not necessarily represent the official views of the college.
(8) The college does not
assume any responsibility or risk for user's use of the internet. The
college does not operate, control or endorse any information, products or
services on the internet in any way.
(9) Users should avoid
personal uses of technology resources that result in any charge to the college.
Users must promptly identify all such charges to the college, and promptly
provide full reimbursement.
(G) Capitalized terms not defined in this
procedure shall have the meaning given to them in the technology resource
policy.
(H) The college president hereby
designates the executive vice president of Administration or that person's
designee to take all steps necessary and appropriate for implementing this
procedure.