This is the SUNY Geneseo policy on college-provided access to electronic information, services, computing facilities, and networks. This policy applies to all persons accessing or using college technology resources. This includes students, faculty and staff, authorized guests, and all persons authorized for access or use privileges by the college, hereafter referred to as users.
Access to information technology is essential to the state university mission of providing the students, faculty and staff of SUNY Geneseo with educational services of the highest quality. The pursuit and achievement of the SUNY mission of education, research, and public service require that the privilege of the use of computing systems and software, internal and external data networks, as well as access to the Internet, be made available to all those of the SUNY community. The preservation of that privilege for the full community requires that each faculty member, staff member, student, and other authorized user comply with institutional and external standards for appropriate use, whether on campus or from remote locations.
Technology resources covered by this policy include, without limitation:
Additionally, all creation, processing, communication, distribution, storage, and disposal of information by any combination of college resources and non-college resources are covered by this policy.
To assist and ensure such compliance, SUNY Geneseo establishes the following policy which supplements all applicable SUNY and College policies, including harassment, patent and copyright, student and employee disciplinary policies, and FERPA, as well as applicable federal and state laws.
Users of college computing resources must comply with federal and state laws, college rules and policies, and the terms of applicable contracts including software licenses while using college computing resources. Users who engage in electronic communications with persons in other states or countries or on other systems or networks may also be subject to the laws of those jurisdictions and the rules and policies of those other systems and networks. Users with questions as to how the various laws, rules and resolutions may apply to a particular use of university computing resources should contact the CIO's Office for more information.
Laws and College Policies
Users must you use technology resources consistent with local, state and federal laws and College policy. Examples include but are not limited to:
In order to prevent further unauthorized activity during the course of such an investigation, Computing & Information Technology may suspend authorization for use of all computing facilities for the user(s) involved in the violation.
- Geneseo Password Controls Policy
- Geneseo Laptop Encryption Policy
- Geneseo Student Code of Conduct http://www.geneseo.edu/handbook/policies_procedures#studentcodeofconduct
- Cyber Citizenship http://www.cybercitizenship.org/index.html
- New York State Laws and Notices http://www.its.ny.gov/tables/technologypolicyindex.htm
- New York State Information Technology Policy IT Best Practice Guideline: Acceptable Use of Information Technology (IT) Resources
- The Digital Millennium Copyright Act http://lcweb.loc.gov/copyright/legislation/dmca.pdf
- US Code Title 17 http://www4.law.cornell.edu/uscode/17
- Electronic Frontier Foundation http://www.eff.org/share
- Respect Copyrights http://www.respectcopyrights.org
CIO and Director, CIT