Acceptable Use Policy

Effective Date July 1, 2024 Policy Owner Information Technology Services (ITS)
Last Reviewed Date July 1, 2024 Approved By President's Council
Review Cycle Annual Policy Contact Information Security & Compliance Analyst

Purpose

New York Tech's technology resources and Data are made available to its faculty, staff, students, affiliates, contractors, and other Users for university-related purposes; all other uses are secondary. Access to and the use of these Computer Resources and Data come with specific expectations and User responsibilities. This policy sets forth the rules for acceptable use of these resources at New York Tech.

Scope

This policy applies to all members of the university community, including faculty, students, staff, contractors, and affiliates, and to authorized visitors, guests, and others for whom technology resources and network access are made available by the university. As a condition to being granted use of, or access to, New York Tech Computing Resources, each User is responsible for the following:

  1. Reviewing, understanding, and complying with policies, laws, and contractual obligations related to access, acceptable use, and security of Computing Resources and Data.
  2. Consulting with policy owners on acceptable use issues not specifically addressed in this policy.
  3. Promptly reporting potential information security incidents to the Information Security Office (infosec@nyit.edu)

Use of New York Tech's Computing Resources, even when carried out on a privately-owned device that is not managed or maintained by New York Tech, including personal devices that connect remotely to New York Tech Computing Resources, are also governed by this policy.

Definitions

Computing Resources: Computing resources include all university-owned, licensed, or managed hardware and software, Data, information, information assets, university assigned User accounts, and use of the university network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network. These policies apply to technology whether administered in individual departments and divisions or by central administrative departments. They apply to personally owned computers and devices connected by wire or wireless to the university network; to off-site computers that connect remotely to the university's network services; and to all websites bearing university credentials.

Data: Any information, regardless of electronic or printed form or location, that is created, acquired, processed, transmitted, or stored on behalf of New York Tech. This includes Data processed or stored by New York Tech in hosted environments in which New York Tech does not own or operate the technology infrastructure.

User/Users: Any person who uses Computing Resources and Data.

Policy Statement

Institutional Use

Use of all university Computing Resources should be for purposes that are consistent with the non-profit educational mission and the policies and legal requirements of the university (including license agreements and terms of service), and not for commercial purposes.

Personal Use

Incidental personal use of New York Tech's Computing Resources is allowed, provided such use does not:

Access, Privacy and Monitoring

Except where stipulated in relevant collective bargaining contracts, the university has the absolute and unconditional right to access, preserve, monitor, review and disclose all information stored on, or transmitted through, its electronic services, equipment, systems and networks. While the university respects the privacy of electronic communications and makes every attempt to keep electronic information secure, privacy is not guaranteed. The university endeavors to afford reasonable privacy for individual Users, and does not access information created, stored or transmitted by individual Users on its Computing Resources except when it determines that it has a legitimate operational need to do so.

Protection of University Resources

Users of university Computing Resources are responsible for protecting university Data, including its confidentiality, integrity, access, retention and disposal, in accordance with the university's Data Security and Access Management Policy, Record Retention and Destruction Policy as well as other applicable university policies. Users with electronic access and administrative or custodial responsibility over any university resources should take reasonable measures to protect these accounts and resources. Shared university technological resources should be used for educational purposes and to carry out the legitimate business of the university, and should not be used in a way that disrupts or otherwise interferes with any university activities or systems, or that is inconsistent with the university's policies or mission.

Prohibited Activities

Use of New York Tech's Computing Resources should not violate applicable federal, state, and local law, including U.S. copyright law, or applicable university policies. If New York Tech work is conducted outside the United States, the laws of the relevant nation or state must also be followed. From any location, university resources may not be used to transmit malicious, harassing, or defamatory content.

The following list describes prohibited conduct. The list is not comprehensive but serves to illustrate and help interpret this policy.

Warranties and Assurances

New York Tech makes no warranties of any kind, whether express or implied, with respect to the Computing Resources it provides. The university is not responsible for any damage resulting from use of Computing Resources, including service interruptions, loss of Data or damage to hardware or software on your personal systems at home, in the residence halls or public access computer labs on campus.

Related Internal Policies

Regulatory References

The following are references to related federal and state laws, policies, guidelines, and resources on cybersecurity.

Violations

Violations of the policy may result in disciplinary action, including dismissal from employment, expulsion from further study, and termination, or suspension of IT and network privileges. In addition, if a User's conduct violates federal or state laws, the User may be subject to prosecution under such laws. The university reserves the right to investigate suspected violations using all means available.