IT Policies & Procedures
Acceptable Use of Technology
May 28, 2014 (Revised 5/14/2019 - added language to the end of the Document Statement,
per HR guidance)
The framework on which this work is based was provided in part by the Cornell University IT Policy Office and its director, Tracy Mitrano, and is gratefully acknowledged.
Document Statement | Principles | Reason for Document | Entities Affected | Who Should Read | Reporting Alleged Violations | Contacts | Related Documents
Document Statement
ϳԹ owns and operates its electronic data infrastructure, which it must manage for the entire college community, in a manner that preserves a level of privacy and confidentiality while in accordance with relevant local state and federal laws, regulations and college policy. Any of the functions/authority/responsibility assigned to a particular position in this document may be completed by the person holding that position “or his/her designee” if said person is unavailable. ϳԹ staff and faculty may be subjected to additional acceptable use policies and guidelines as reflected in the Employee /employee-handbook/resources/vi-g.php and Faculty handbooks.
Principles
The computing facilities at ϳԹ are intended as a resource for all members of the college community. While IT encourages users to explore the versatility and power of the computing environment, users must:
- Use only those computing and information technology resources for which they have authorization.
- Protect the access to and integrity of computing, data and information technology resources. Ensure that sensitive data created, collected, maintained, used, disseminated and destroyed in a manner that prevents unauthorized use, corruption, disclosure, loss or theft.
- Abide by all applicable local, state and federal laws and college policies.
- Respect the copyrights and intellectual property rights of others, including the legal use of copyrighted software.
- Use computing, data and information technology resources only for their intended purpose.
- Respect the privacy and personal rights of others.
- Refrain from any use that results in personal financial gain.
- Never store or tansmit any payment card information (PCI) through end-user messaging technologies or through the Campus' wireless (Wi-Fi) network.
Reason for the Document
To protect the ϳԹ community and ϳԹ-managed computer systems from inappropriate use and to comply with relevant state and federal regulations and laws and college policies.
Entities Affected by this Document
All entities of the college.
Who Should Read this Document?
All members of the college community.
Reporting Alleged Violations
Violations of this policy can be reported to (in writing) and will be governed by the respective area’s disciplinary channels.
- For faculty: The Vice President of Academic Affairs (VPAA) and Dean of the Faculty (DoF).
- For staff: The Office of Human Resources.
- For students: The Student Conduct Officer.
Violations of this policy may also be reported (in writing) to the appropriate individual as detailed in Table 1. Alternatively, you may also contact your supervisor, or a member of the President’s Cabinet.
Contacts
Direct any general questions about the college's acceptable-use policy to your department chair or director. If you have questions about specific issues, call the offices listed in Table 1.
Table 1
Subject |
Contact |
Telephone |
Email/website |
Document clarification and interpretation |
Dwane Sterling Chief Technology Officer, Information Technology |
518-580-5909 |
|
Policy Violations |
|||
Staff |
Sarah Vero |
518-580-5809 |
|
General | Dwane Sterling Chief Technology Officer |
518-580-5909 | dsterlin@skidmore.edu |
Faculty | Michael Orr VPAA and Dean of the Faculty |
518-580-5705 | morr@skidmore.edu |
Students | Ann Marie Przywara Associate Dean of Student Affairs for Residential Life and Student Conduct |
518-580-5765 | aprzywar@skidmore.edu |
Related Documents
- (20 U.S.C. ¤ 1232g; 34 CFR Part 99)
- (Gramm-Leach-Billey Act)
- ϳԹ Faculty Handbook
- ϳԹ Employee Handbook
- ϳԹ Student Handbook