Information Technology Resource Usage Policy

Purpose

The purpose of this policy is to outline the acceptable uses of information technology resources for the Eastern Arizona College community. Whether from on or off campus, individuals and groups using EAC resources are responsible for complying with this policy.

Scope

This policy applies to all information technology resources, including but not limited to, equipment, software, networks, accounts, data, and telecommunications equipment whether owned, leased or otherwise provided by the college. EAC provides the resources to support the academic, administrative, and instructional objectives of the college. The use of these resources are limited to faculty, staff, college students and other authorized users to accomplish tasks appropriate to the responsibilities of the individual.

Policy

Acceptable Use Guidlines

Preserving the access to information resources is a community effort that requires each member to act responsibly and guard against abuses. Therefore, both the Eastern Arizona College community as a whole and each individual user have an obligation to abide by the following standards of acceptable use:

    • Using only those information technology resources and data for which you have authorization and only in the manner and to the extent authorized.
    • Using information technology resources only for their intended purpose.
    • Protecting the confidentiality, availability, and integrity of information technology resources, including data.
    • Abiding by applicable laws and College policies and all applicable contracts and licenses and respecting the copyright and intellectual property rights of others, including the legal use of copyrighted material.
    • Respecting the finite capacity of resources and limit use so as not to consume an unreasonable amount of resources or to interfere unreasonably with the activity of others.
    • Respecting the privacy and personal rights of others.

 

Unacceptable Use Guidlines

The following unacceptable uses apply to all uses of College information technology resources. In the constantly changing world of information technology, it is impossible to enumerate all non-acceptable uses of College computers, information systems, and networks. All users are expected to conduct themselves within acceptable use boundaries and may not infringe or assist others with the infringement of the following examples of unacceptable use.

    • Using information technology resources without proper authorization.
    • Exposing sensitive or confidential information or disclosing information that you do not have the authority to disclose.
    • Sharing your account password/passphrase with anyone or allowing anyone to use your account.
    • Attempting to access an account other than the account provided for your use.
    • Attempting to obtain privileges for which you are not authorized.
    • Attempting to learn another user’s password(s) or personal information.
    • Using technology resources for illegal activities, including threats, harassment, copyright infringement, defamation, theft, identity theft, and unauthorized access.
    • Using information technology resources for profit, commercial or political use.
    • Attempting to monitor, intercept, analyze or modify network traffic or transactions not specifically addressed to your computer, including e-mail and chat messages not addressed or assigned to you.
    • Attempting to alter or reconfigure any College technology resources, e.g. network infrastructure, servers.
    • Attempting to alter or obscure your identity or your computer’s identity, including but not limited to IP Address and email address, while communicating on any network.
    • Interfering with or disrupting computer or network accounts, services or equipment of others including but not limited to consumption of excessive network or system resources including internet bandwidth.
    • Interfering with or circumventing Computer Services’ responsibilities and procedures.
    • Abusing email privileges.

 

Coordination with Other Policies and Laws

Users of information technology resources at EAC are subject to applicable federal, state, and local laws, applicable contracts and licenses, and other college policies, notably those governing copyright and intellectual property compliance. Users are responsible for ascertaining, understanding, and complying with the laws, rules, policies, contracts and licenses applicable to their particular uses.

Privacy and Security

There is no inherent expectation of privacy for information stored on EAC’s information technology resources, except as provided by federal and state law and other College policy. Every effort will be made to maintain individual privacy, but the College will not be liable for the failure of these privacy efforts. While the College does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the College’s information technology resources require the backup and caching of data and communications, the logging of activity, the monitoring of general usage patterns, the scanning of systems and network ports for anomalies and vulnerabilities, and other such activities that are necessary for the execution of these services.

Enforcement

Any member of the Eastern Arizona College community found in violation of this policy may be denied access to College information technology resources and may be subject to disciplinary action, both outside and within the College.

Revision History Last updated: 4/5/2019