Information Technology – Acceptable Use Policy

The College provides resources for the primary purpose of supporting the academic, administrative, business and communication needs of the College. All users of technology resources must exercise responsible, ethical behavior when using these resources and are expected to abide by College policies and local, state, and federal laws regarding their use. This policy defines the acceptable use of these technology resources.

“Technology Resources” refers to all computers, servers, switches, firewalls, software, wiring, network components, devices and services managed, whether owned or leased by the College.

Scope

This policy applies to all users of Bellin College technology resources. A "user" is defined as any individual who logs into, uses, or attempts to log into or use, a College system; or any individual who connects to, or attempts to connect to or traverse the College network, whether by hardware or software or both, whether on campus or from a remote location.

Policy

Access to Bellin College technology resources is a privilege granted to guests, contractors, faculty, staff, and students. This privilege is predicated on the user’s acceptance of and adherence to all College information technology and services policies. The College reserves the right to limit, restrict or extend access to technology resources. Access to technology resources will be documented on the Network Access Request Form for all guests, contractors, faculty, staff, and work-study students. Please note: This form is not required for students except for work-study students requiring access to an administrative system. The Bellin College technology resources are a private system. As such, the information stored on its computers and servers are the property of the College with the exception of material expressly developed by users for publication. Copyright and ownership of such content must be expressly and clearly stated in such works. Individuals who place content owned by others on College systems under their use accept full responsibility for maintaining compliance with copyright laws. The use of technology resources for personal purposes is allowed as long as the following occurs:

  • Use is minimal and of short duration.
  • The use does not interfere with the user’s duties and responsibilities or that of others.
  • Personal use does not violate any College policies and local, state, or federal laws.
  • Use does not interfere with the primary purposes of the system.
  • Use does not adversely affect technology resources.

User Responsibilities

User responsibilities and expectations include but are not limited to the items listed below.

  • All student work is to be submitted using a Microsoft Office compatible format.
  • Students abide by applicable laws, College policies, contracts, and licenses.
  • Students use only the technology resources and data they are authorized to use for and only in the manner and to the extent authorized.
  • Students respect the copyright and intellectual property rights of others, including the legal use of copyrighted material.
  • Students protect the access and integrity of technology resources.
  • Students maintain privacy and security by keeping all passwords confidential.
  • Students respect the privacy and personal rights of others.
  • Students delete old and unused email and files on a regular basis.
  • Students develop adequate proficiency in the tools and technologies appropriate to their needs.

Inappropriate Network Usage

The following uses, while not all inclusive, are considered inappropriate and unacceptable:

  • Misuse, abuse, or cause damage to technology resources.
  • Employ the use of software or hardware designed to disrupt or circumvent the security of any technology resource.
  • Engage in any activities designed to spy on network traffic or to access passwords, user IDs and files or programs of other users.
  • Impersonate another network user.
  • Access or attempt to access College business or another individual's data or information without proper authorization, even if not securely protected.
  • Use College technology resources for non-College related activities beyond that of which the above policy states.
  • Install or use any software or network hardware not approved by the director of technology.
  • Engage in software piracy or copyright infringement. Please note: all software installed on College computers must be used in conformance with the license granted by the developer. Unlicensed products will be immediately removed from College computers.
  • Provide access to Bellin College technology resources to individuals, groups, or businesses outside the College community, except as authorized in writing by the President, a Dean or Vice President, or the Director of Technology.
  • Exchange proprietary information or any other privileged, confidential, or sensitive information without proper authorization.
  • Participate in email chain letters, spamming, junk mail, email bombing attacks or virus hoaxes.
  • Knowingly forward an email message or otherwise introduce a virus-infected file by other means into the College network.
  • Send, store, print or solicit receipt of email messages, files or programs that contain fraudulent, harassing, racist or obscene language, visual, or audio material or content. The College reserves the right to determine the appropriateness of such material and content.
  • Use the College technology resources for illegal behavior or activities as defined by federal, state and/or local laws.

Enforcement Procedures

The College retains the right, without restriction, to monitor, authorize, control, or stop the use of any technology resource found on its computers or networks. Violations of any College policy will be referred to the appropriate administrator for action through the established disciplinary processes.

This may result in:

  • Deleted files and/or programs.
  • Disabled user accounts.
  • Withdrawn user access privileges.
  • Suspension, expulsion, or termination from College employment.

Administrative Systems

The privacy of student record information and the rights and responsibilities of handling the information is federally governed by the Family Educational Rights and Privacy Act of 1974 (FERPA). All employees of Bellin College are required to abide by FERPA regulations and College policies regarding access to and use of College student, Advancement and Alumni Relations or financial information.