Skip to main content
Back To Top Top Back To Top
This website publishes administrative rules on their effective dates, as designated by the adopting state agencies, colleges, and universities.

Rule 3354:1-50-05.1 | Technology resources procedure.


(A) User access.

The college operates and maintains technology resources to facilitate achievement of its missions and goals. Access to technology resources is a privilege granted to users, but is not a right. Access may be denied, and technology resources may be seized, at any time and without notice. Every user is subject to this procedure, and other applicable policies and procedures of the college.

(B) Prohibited user behavior.

(1) Using technology resources to violate, or while violating, any law or college policy or procedure.

(2) Accessing or attempting to access any technology resource without proper authorization from the technology systems and resources ("TSR") department; or using any technology resource to access or attempt to access any other party's technology resource without proper authorization.

(3) Using technology resources to access, display, transmit, or store obscene or pornographic materials or communications.

(4) Interfering or attempting to interfere with the operation of any technology resource, or with any user's use or access.

(5) Sharing without prior TSR authorization any username, password, or other access security method; or using or facilitating the use of any technology resource that is subject to any access restriction without prior TSR authorization.

(6) Using any technology resource to send any communication using a false name, or using any other method that suggests another individual is the sender.

(7) Using any technology resource in a manner inconsistent with contractual obligations or other legal restrictions applicable to the college.

(8) Using technology resources in such a way as to appear to express the views of the college (except to the extent one is properly authorized to do so).

(9) Knowingly or intentionally introducing any bugs, viruses, worms, or other "malicious software" to technology resources; or knowingly or intentionally using technology resources to propagate any bugs, viruses, worms, or other "malicious software."

(C) No expectation of privacy.

Users should not have an expectation of privacy in anything they create, store, send, or receive using technology resources. Users should be aware that communications and other information sent or received through technology resources may not remain confidential while in transit or while stored on the sending or receiving technology resources. The college reserves the right, with or without notice, to monitor, access, and record all user activities involving technology resources.

The college monitors and records all user internet activity. Periodically, this activity is analyzed for individuals' violations of college policies and procedures. (At any time, users may obtain a list of internet activity associated with their account by submitting a request to the vice president of TSR.) The normal operation and maintenance of technology resources generally includes the backup and caching of data and communications, the logging of activity, the monitoring of general usage patterns, and other activities.

The college may also specifically monitor and record the activity and accounts of individual users of technology resources, including individual login sessions, communications, and any other activities, without notice, when (1) the user has voluntarily made them accessible to the public, as by posting to usenet or a web page; (2) it reasonably appears necessary to do so to protect the integrity, security, or functionality of college or other technology resources or to protect the college from liability; (3) reasonable cause exists supporting the belief that the user has violated, or is violating, college policy or procedure; (4) a user account appears to be engaged in unusual or unusually excessive activity, as indicated by the monitoring of general activity and usage patterns; or (5) when such monitoring or recording is otherwise required or permitted by law. Individually-targeted monitoring described in this paragraph must be authorized in advance by the vice president of TSR, vice president of human resources, or the college president.

The college, in its discretion, may disclose the results of any such general or individual monitoring, including the contents and records of individual communications, to appropriate college personnel or law enforcement agencies and may use those results in appropriate college disciplinary proceedings. Communications and other information transmitted or stored using technology resources may also be subject to disclosure under Ohio's public records laws.

(D) Installation of software and connection of devices.

Only TSR may install software on technology resources, or connect any device to technology resources. Any user who connects a device or installs software in violation of the foregoing does so at the user's own risk, and the college may hold such users responsible for any associated costs, claims, losses, or liabilities. Devices connected or software installed by anyone other than TSR will not be supported by the college, and may be removed by the college at any time without notice and without any liability for any damages whatsoever to any party.

(E) Violations.

Violation of this procedure may result in sanctions up to and including: immediate and permanent termination of access privileges; and civil or criminal legal action by the college, law enforcement organizations, and injured third parties. In addition, students, faculty, and staff may be subject to disciplinary actions described in other applicable College policies and procedures.

(F) Notices and disclaimers.

(1) The college may restrict or terminate user access at any time, without notice, and with or without any reason.

(2) Users are solely responsible for backing up their own files. Failure to do so may result in damage or complete loss of files and all associated information.

(3) The college disclaims any and all representations or warranties, expressed or implied, about the technology resources' quality; effectiveness; safety; fitness for any purpose; and lack of errors, viruses, worms, or other "malicious software."

(4) The college is not responsible for offensive or illegal material which may be accidentally or intentionally sent, received, or displayed while using computers or networks belonging to the institution.

(5) The college is not responsible for damaged, lost, unavailable or stolen data, intellectual property, or other real property resulting from or occurring while using technology resources.

(6) The availability of technology resources is not guaranteed to any extent whatsoever.

(7) Technology resources sometimes link to or contain materials generated or posted by college departments, organizations, students, employees, or others. Such materials do not necessarily represent the official views of the college.

(8) The college does not assume any responsibility or risk for user's use of the internet. The college does not operate, control or endorse any information, products or services on the internet in any way.

(9) Users should avoid personal uses of technology resources that result in any charge to the college. Users must promptly identify all such charges to the college, and promptly provide full reimbursement.

(G) Capitalized terms not defined in this procedure shall have the meaning given to them in the technology resource policy.

(H) The college president hereby designates the executive vice president of Administration or that person's designee to take all steps necessary and appropriate for implementing this procedure.

Supplemental Information

Authorized By: