Acceptable Use Policy
Goodwin College's information systems and resources (including computers, computer accounts, printers, networks, software, electronic mail, Web pages, Webcam, audio and video conferencing, and the telephone and voice mail systems) are for the use of Goodwin College students, faculty and staff. Users are encouraged to explore and utilize information systems and resources and to share their knowledge and expertise with other Goodwin College users. However, resources may not be used for commercial purposes outside the scope of the College's mission. The provision of information systems and resources at Goodwin College requires legal and ethical utilization by all users. The following list, though not covering every situation, specifies policies and regulations that govern usage of information systems and resources at Goodwin College.
Use of Computing Resources:
All users must comply with federal and state laws and all College policies related to any copying and use of computer software and electronic files. Goodwin College resources must not be used to violate the terms of license agreements, copyright, or trademark laws.
In addition, other activities that threaten the integrity of the system or harm individual users are not allowed.
Prohibited activities include, but are not limited to:
- Falsifying your identity when sending a communication.
- Tampering with, abusing, or otherwise damaging computer or telephone hardware or software. This includes software or network tampering (hacking), such as attempting to crack or guess passwords, sending anonymous mail, or “bombing” a mailbox with multiple copies of a message.
- Running or installing any program or sending any mass communication that overloads or substantially interferes with the proper operation of the computer system or network.
- Overloading or substantially interfering with the proper operation of the College's network and computer data storage.
- Using the College's computers or network or the telephone system to transmit fraudulent, defamatory, harassing, obscene or threatening messages or any communications prohibited by law.
- Improperly or inaccurately stating or implying the College's sponsorship or endorsement of any communications, including anything contained on a personal web page on the College's computers or network.
- Participating in or signing up for activities, the cost of which will be charged to the College, without obtaining the College’s prior authorization.
Users who publish web pages or similar information resources on the College computers or computer system shall take full responsibility for what they publish, shall abide by this policy and other College policies, shall comply with all applicable laws, and shall not publish commercial advertisements without prior written authorization.
Security: Goodwin College computer and telephone systems are vital to the academic mission of the College. To protect the safety and security of these systems, you must only use your account. You are responsible for all use of your account and may not authorize anyone else to use your account. You must take all reasonable precautions, including password maintenance and file protection measures to prevent its unauthorized use.
You must log in only to your own account, except for extraordinary situations where faculty or staff receive permission to access another person's account from Human Resources or the network administrator. In all other circumstances, you may not use another person's password or otherwise seek to gain access to another user's account.
Within means available, every member of the faculty, staff and student-body must take personal responsibility for maintaining the security of institutional records. Institutional records include all matters pertaining to personnel, payroll, registrar, admissions, financial aid, development, medical records, security reports, financial data and other information of a privileged and private nature.
No one has the right or authority to extend his or her own established range of access to computer records. You must not attempt to modify the system facilities or attempt to crash the system. You must not attempt to subvert the restrictions associated with your computer accounts. You must not tamper with any software protection placed on any computer applications. You must not modify or delete data in a College data base without authority.
Privacy: The College acknowledges its obligation – within the limitations of this policy and its ability – to respect the privacy of users' electronic files and communications on the College's information systems and resources. All system administrators shall respect the privacy of users and shall comply with the terms of this policy.
However, individual users of information systems and resources should be sensitive to the inherent limitations of shared network resources. No computer security system can absolutely prevent unauthorized persons from accessing stored information and the College cannot and does not guarantee the privacy or confidentiality of stored information or electronic communications.
The College has the right to monitor and access a user's communications, files, stored information and use of the system only under the following limited circumstances:
- When the user has consented, or has voluntarily made information or communications accessible to the public, as by posting them to a web page or listserv;
- When necessary to maintain College business functions and the employee is no longer with the College, is suspended, or is otherwise unavailable;
- When required by law or by College policies or regulations, as reflected in the Information for Faculty, the Employee Handbook, or the Student Handbook;
- When necessary to protect the integrity, security and proper functioning of the College's computers and networks or to protect the College from liability;
- When necessary to enforce this policy or other College policies and regulations, as reflected in the Information for Faculty, the Employee Handbook, or the Student Handbook, including the College's sexual harassment policy and anti-discrimination policies, and to investigate when there is reasonable cause to believe that any of those policies or any state or federal laws has been or is being violated. A user's communications or files will be accessed for this purpose only with the prior approval of the Vice President, Facilities and Information Technology or their designee, and Human Resources, in consultation with the appropriate Senior Administrators.
- If the College monitors or accesses a user's files or communications, it will respect information and communications that are privileged or otherwise protected from disclosure by law. Any monitoring or access to a user's files or communications will be no more extensive than necessary to accomplish the business-related purpose for which it is authorized under this policy.
Other Applicable Rules, Laws: Users of the College's electronic resources, including E-mail communications, are subject to College policies and other statements of conduct as published in the Student Handbook, Faculty Handbook, and the Employee Handbook as well as all applicable federal and state laws. It should be understood that this Acceptable Use Policy does not supersede existing College regulations and policies – including the College's non-discrimination and sexual harassment policies – or the laws and regulations of the state of Connecticut and/or the United States of America.
Consequences: System administrators shall have the right to temporarily suspend any user's access to the system without notice where there is reasonable cause to believe such access poses a threat to the security or proper functioning of the system or where it is necessary to comply with the law. Violations of this policy or any other College rules on computer use will be considered grounds for removal of account and network privileges, and where appropriate, other disciplinary action. The College may revoke a user's account and network privileges for violations of law, of this policy or other College policies and regulations, only after notice and opportunity to be heard. Other possible disciplinary action will be determined through referral to the appropriate disciplinary authorities under existing College procedures.