Computer Use

1. Acceptable use of data and information systems policy

 Unless otherwise specifically detailed in writing, all college owned or controlled information technology resources (computers, networks, servers and other devices) and all data contained in any college-owned or controlled information system (Banner, Adirondack, e-mail, and other systems) are the property of the college and exists expressly for the purpose of educational use and legitimate college-related business. Any other use of these resources or systems or release of data contained in them is prohibited. 

Employees are expected to comply with this policy and the use of any system is considered an acknowledgement they will do so.  Students are required to affirm their intent to comply with the Code of Student Rights, Responsibilities and Conduct prior to being given access to these systems. Employee violations of this policy may lead to disciplinary action in accordance with applicable collective bargaining agreements and SUNY and New York State policies. Student violations of this policy may lead to disciplinary charges as described in the Code of Student Rights, Responsibilities and Conduct. Misuse of these resources or systems or the data contained in them may also subject employees and students to prosecution consistent with New York State Law. 

The college reserves the right revoke an individual’s access to any and all information systems or data.

 2. Acceptable use of data and information systems: requirements and procedures for compliance

    A. The College’s network provides data and services in support of its educational mission. It is the responsibility of each member of the campus community to use these resources appropriately and in compliance with all campus policies and local, state, and federal laws and regulations. Access is a privilege that can be revoked due to misuse. By connecting to the campus network, users agree to the terms and conditions of the Acceptable Use of Data and Information Systems Policy as well as the policies in the Faculty and Professional Staff Handbook and the Student Handbook. The college will make every reasonable effort to protect the privacy and security of user data. The college reserves the right to exam user data in resolving computer or network malfunctions, investigating information security incidents, or responding to disciplinary or legal actions involving a user.

    B. Users who administer computers on the campus network that are used as servers have the additional responsibility to respond to any use of their server(s) that is in violation of the Acceptable Use of Data and Information Systems Policy.  Server administrators must take steps to prevent recurrence of such violations and report these violations to Campus Technology Services (CTS) Help Desk. Additionally, server administrators must fully cooperate with campus, local, state, and federal civil and criminal authorities investigating complaints of abuse of network services (e.g., by installing monitoring and tracking software, providing access to activity logs, etc.).

    C. Campus units and individuals who configure computing systems to provide information retrieval services to the public at large must do so in a manner consistent with the college’s mission. For any such services provided through the campus network the college’s name must not be used in ways that suggest or imply endorsement of other organizations, their products, or services.

    D. The campus network is a shared resource. Excessive use of network resources which inhibits or interferes with the use of the network by others is not permitted. Any person operating a network-intensive application, a defective computer, or other network-connected device which overloads the network will be notified and steps will be taken to protect the overall network. This may include disconnecting the offending system from the network until the problem is resolved. If the condition is an imminent hazard to the campus network or disrupts the activities of others, the offending system or the section of the network to which it is attached may be disconnected without prior notice.

    E. The campus network may not be used for any illegal activities. Any receipt, transmission or retransmission of software or data must observe copyright laws, license restrictions, and college policies. Illegal activities include, but are not limited to, file-sharing in violation of the Digital Millennium Copyright Act (DMCA) and denial of service attacks.

    F. Campus network resources may not be used to defame, harass, intimidate or threaten.  College harassment policies cover all uses of the campus network including e-mail correspondence, distribution lists, and web pages.

    G. A user may not view, copy, alter or destroy any data, or connect to a host on the network without explicit permission of the owner.

    H. Campus network services, equipment, wiring or jacks may not be altered, removed, or extended beyond the location of their intended use.

    I. The campus network may not be used to provide access to campus information systems for purposes other than those that are in support of the College’s mission.

    J. Access to the campus network may not be resold or otherwise provided to anyone not formally affiliated with the College unless prior written permission is obtained from Campus Technology Services.
   K. College-owned or controlled network resources, such as Penfield Library’s digital resources and databases, may not be retransmitted outside of the college community.

   L. Users may not forge or otherwise misrepresent another’s identity through any form of communication.

   M. The campus network may not be used to circumvent protection schemes or exercise security loopholes in any computer or network component.

   N. The campus network may not be used for commercial or profit-making enterprises, except for those activities officially sanctioned by the college.

   O. Violations of the Acceptable Use of Data and Information Systems Policy will be adjudicated by the Campus Technology Services or other appropriate campus administrative units. Violations of local, state and federal law will be referred to the appropriate authorities. Violations of these regulations may result in disciplinary sanctions as prescribed by the Code of Student Rights, Responsibilities and Conduct such as:

  • Loss of access privileges
  • Monetary reimbursement to the college or other appropriate sources
  • Reassignment or removal from campus housing and/or the college
  • Prosecution under applicable civil or criminal laws

Further information on the campus Acceptable Use of Data and Information System Policy is available from the office of the Chief Technology Officer.

3. Copyright: computer software

It is the intent of the college to adhere to the provisions of copyright laws in the area of computer programs. In an effort to discourage violation of copyright laws and to prevent such illegal activities:

   A. It is recommended that the ethical and practical problems caused by software piracy be taught in all classes involving the use of computers.

   B. College employees will be expected to adhere to the provisions of Public Law 96-517, Section 7(b) which amends Section 117 of Title 17 of the United States Code to allow for the making of a backup copy of computer programs. This states that, “ is not an infringement for the owner of a copy of a computer program to make or authorize the making of another copy or adaptation of that computer program provided that:

       1. Such a new copy or adaptation is created as an essential step in the utilization of the computer program in conjunction with a machine and that it is used in another manner, or
       2.  Such a new copy and adaptation is for archival purposes only and that all archival copies are destroyed in the event that continued possession of the computer program should cease to the rightful.”

   C. When software is to be used on a disk sharing system, efforts will be made to secure this software from copying.

   D. Illegal copies of copyrighted programs may not be made or used on college equipment.

   E. No person shall use or cause to be used on the college’s computer laboratories any software which does not fall into one of the following categories:

      1.  It is in the public domain.
      2.  It is covered by a licensing agreement with the software author(s), vendor or developer, whichever is applicable.
      3.  It has been donated to the college and a written record of a bona fide contribution exists.
      4.  It has been purchased by the College and a record of a bona fide purchase exists.
      5.  It has been purchased by the user and a record of a bona fide purchase exists and can be produced by the user upon demand.
       6.  It has been written or developed by a university employee or student for the specific purpose of being used in a college computer laboratory or facility.

   F. The employee or designated person in charge of each computing facility (or administrative officer(s) designated by the college administration) will be the person responsible for establishing and publishing clear description of practices which will enforce this policy.