Computing Code of Responsible Technology Usage: U.S. Campuses
Belongs To Collection(s)
> student handbook us edition
New York Tech provides resources—including telephone and computer equipment, software, networks, and user accounts—for use by its faculty, staff, students, and university affiliates. Any and all information or communication transmitted by, received from or stored in these systems are property of the college and are provided for use in support of programs of the college. All users of these resources are required to use them in a manner that is respectful of each other's and the institution's rights, privileges, and interests. However, abuse of equipment or systems that causes disruption of users' productivity, and the integrity of data and programs, may be subject to disciplinary action or prosecution under college policies, and local, state, or federal laws.
Purpose
- Computing Code: The computing code sets forth standards of behavior that apply to all faculty, students, staff and university affiliates. In addition, the purpose of this code is to define responsible technology usage, particularly for new users who may not be aware of the potential impact of their actions.
- Computer Ethics Policy Statement: Computers, telecommunications, and information in electronic form create a need for ethical models. Information owners, both individual and institutional, must make a conscious and explicit effort to state and enforce their expectations of ethical behavior. Information users have an obligation to recognize the information owner's rights in order to protect and preserve their own rights to use that information.
- Computer-Based Information: Computer-based information, recognized as a primary educational and research asset, should be protected from unauthorized modification, destruction, disruption, or disclosure—whether accidental or intentional. The use of these systems is a privilege, not a right, and may be revoked at any time. All technology-related questions, requests, and complaints should be directed to ITS Help. All calls will be directly responded to or will be referred to the appropriate office for answers and resolution.
Computing Usage Statement of Responsibilities
- College Responsibilities: The college assumes the responsibility to ensure the integrity of its computing systems, workstations, and facilities. System usage will be monitored to ensure that irresponsible users cannot affect the performance and integrity of other accounts and other users' information or the systems.
- User Responsibilities: Each user is solely responsible for the usage incurred through their account/workstation. Individuals, who intentionally abuse accounts and privileges, degrade system performance, misappropriate resources, or interfere in any way with the operation of the technology, are subject to penalties.
- Student Responsibilities: If a student discovers what may be a security lapse in our systems, the student should report their concerns to the Office of Information Technology and Infrastructure.
- Privacy Statement: Each user is assigned one or more confidential passwords intended to restrict access to files and systems, including email. Students should have no expectation of privacy of documents stored on computer systems or in messages sent across the network. The college has the absolute and unconditional right to investigate, review and monitor these materials, including, but not limited to, eradication of computer viruses; data access, backup and restoration; hardware and software inventory procedures, including scans for unlicensed software installations; installations, maintenance, updates, and repair; investigations relating to compliance with college policies, including the college's technology policies; and investigation of criminal, unlawful, or unauthorized activities as directed by local, state, or federal authorities, or by the senior management of the college.
- Standards for Computer Usage: Access and use of college computing systems and services is defined below. It applies equally to all users of college-owned and -operated information systems and equipment.
- Any access prohibited by state or federal law is unauthorized. Any access or use in support of activities that are prohibited by state or federal law is unauthorized.
- Individuals who willfully cause loss to authorized account holders by unauthorized access or use shall be held financially responsible for the cost of restoring that user's data, programs, and account balance.
- Violators who are members of the college community will be subject to disciplinary action under college regulations applying to their respective status within the college. All violators will be subject to prosecution under any local, state, or federal laws that apply.
Computer Abuse
The following are examples of computer abuse (this list is illustrative and not meant to be all-inclusive):
- Unauthorized use of account and/or password, including but not limited to, ineligibility. Individual accounts cannot be transferred to or used by another person. Attempting to gain access to privileged areas or to accounts that do not belong to the student.
- Frivolous, disturbing, or otherwise inconsiderate conduct, including extensive use of workstations, playing games, sending nuisance messages, or wasteful or unauthorized use of college-supported facilities.
- Possession or use of programs capable of fraudulently simulating system responses; modification of or possession of systems-control information, especially that which reflects program state, status, or accounting; attempts to modify or crash the system.
- Any violation of the New York Tech student or employee codes of conduct that involves technology resources.
- Use of college resources for non-college-related commercial purposes is strictly prohibited. This includes, but is not limited to, development of programs, data processing or computations for non-college-related commercial use, and preparation and/or presentation of advertising materials not related to the college.
- Using college resources to gain unauthorized access to other systems; unauthorized access to data or files even if they are not securely protected; attempting to read another person's email or other protected files; and using equipment to send obscene or harassing messages.
- Copying, storing, displaying, or distributing copyrighted materials using college computer systems or networks without the express permission of the copyright owner, except as otherwise allowed by copyright law.
- Using technology for any unethical, illegal, or criminal purposes; tapping network transmissions, including wireless transmissions; and making more copies of licensed software than the license allows.
- Releasing a virus, worm, or other program that damages or otherwise harms a system or network.
- Preventing others from accessing services.
- Using university resources for unauthorized purposes.
Please refer to the Acceptable Use Policy for further details