Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Users of college computing resources must comply with federal and state laws, college rules and policies, and the terms of applicable contracts including software licenses while using college computing resources. Users who engage in electronic communications with persons in other states or countries or on other systems or networks may also be subject to the laws of those jurisdictions and the rules and policies of those other systems and networks. Users with questions as to how the various laws, rules and resolutions may apply to a particular use of university college computing resources should contact the CIO's Office for more information.

...

Users should also be aware that their uses of college computing resources are not private vis-à-vis the college. The college always retains ownership of its computing resources. Such ownership provides the college with an inherent right of access. While the college does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the college's computing resources require the backup and caching of data and communications, the logging of activity, the monitoring of general usage patterns and other such activities that are necessary for the provision of service. The university college may also specifically monitor or inspect the activity and accounts of individual users of college computing resources, including individual login sessions and the content of individual communications, or delete user content that is not required to be kept by retention policy without notice or permission, when:

  • The user has voluntarily made them accessible to the public, as by posting to a web page;
  • It reasonably appears necessary to do so to protect the integrity, security, or functionality of college or other computing resources or to protect the college from liability;
  • There is reasonable cause to believe that the user has violated or is violating this policy or any other law or policy;
  • An account appears to be engaged in unusual or unusually excessive activity;
  • Accessing the account is otherwise required or permitted by law, including but not limited to freedom of information laws, laws governing the conduct of parties engaged in or anticipating litigation, and laws governing criminal investigations.

Users shall respect the privacy of others. Users shall not intentionally view information of other users, modify or obtain copies of other users' files, access or attempt to access other users' email, or modify other users' passwords without their permission. Geneseo computers and networks are designed to protect user privacy; users shall not attempt to circumvent these protections. 

Users shall not develop or use procedures to alter or avoid the accounting and monitoring of the use of computing facilities. For example, users may not utilize facilities anonymously or by means of an alias, and may not send messages, mail, or print files that do not show the correct username of the user performing the operation.

...

Users who violate this policy may be denied access to college computing resources and may be subject to other penalties and disciplinary action, including possible expulsion or dismissal. Alleged violations will be handled through the university disciplinary college disciplinary procedures applicable to the user. The college may suspend, block or restrict access to an account, independent of such procedures, when it reasonably appears necessary to do so in order to protect the integrity, security, or functionality of college or other computing resources or to protect the university from college from liability. The college may also refer suspected violations of applicable law to appropriate law enforcement agencies.

...

Panel

Effective Date: August 1989
Last Updated: April 2014May 2019


Page properties
hiddentrue

Owner (area)CIO & Support Services
Reviewed by
Review Date

  


...