Acceptable Use Policy

Goodwin College's information systems and resources (including computers, computer accounts, printers, networks, software, electronic mail, Web pages, Webcam, audio and video conferencing, and the telephone and voice mail systems) are for the use of Goodwin College students, faculty and staff. Users are encouraged to explore and utilize information systems and resources and to share their knowledge and expertise with other Goodwin College users. However, resources may not be used for commercial purposes outside the scope of the College's mission. The provision of information systems and resources at Goodwin College requires legal and ethical utilization by all users. The following list, though not covering every situation, specifies policies and regulations that govern usage of information systems and resources at Goodwin College.

Use of Computing Resources

All users must comply with federal and state laws and all College policies related to any copying and use of computer software and electronic files. Goodwin College resources must not be used to violate the terms of license agreements, copyright, or trademark laws.

In addition, other activities that threaten the integrity of the system or harm individual users are not allowed. Prohibited activities include, but are not limited to:

Users who publish web pages or similar information resources on the College computers or computer system shall take full responsibility for what they publish, shall abide by this policy and other College policies, shall comply with all applicable laws, and shall not publish commercial advertisements without prior written authorization.

Security & Privacy

Goodwin College computer and telephone systems are vital to the academic mission of the College. To protect the safety and security of these systems, you must only use your account. You are responsible for all use of your account and may not authorize anyone else to use your account. You must take all reasonable precautions, including password maintenance and file protection measures to prevent its unauthorized use.

You must log in only to your own account, except for extraordinary situations where faculty or staff receive permission to access another person's account from Human Resources or the network administrator. In all other circumstances, you may not use another person's password or otherwise seek to gain access to another user's account.

Within means available, every member of the faculty, staff and student-body must take personal responsibility for maintaining the security of institutional records. Institutional records include all matters pertaining to personnel, payroll, registrar, admissions, financial aid, development, medical records, security reports, financial data and other information of a privileged and private nature.

No one has the right or authority to extend his or her own established range of access to computer records. You must not attempt to modify the system facilities or attempt to crash the system. You must not attempt to subvert the restrictions associated with your computer accounts. You must not tamper with any software protection placed on any computer applications. You must not modify or delete data in a College data base without authority.

Privacy: The College acknowledges its obligation – within the limitations of this policy and its ability – to respect the privacy of users' electronic files and communications on the College's information systems and resources. All system administrators shall respect the privacy of users and shall comply with the terms of this policy.

However, individual users of information systems and resources should be sensitive to the inherent limitations of shared network resources. No computer security system can absolutely prevent unauthorized persons from accessing stored information and the College cannot and does not guarantee the privacy or confidentiality of stored information or electronic communications.

The College has the right to monitor and access a user's communications, files, stored information and use of the system only under the following limited circumstances:

Other Applicable Rules, Laws

Users of the College's electronic resources, including E-mail communications, are subject to College policies and other statements of conduct as published in the Student Handbook, Faculty Handbook, and the Employee Handbook as well as all applicable federal and state laws. It should be understood that this Acceptable Use Policy does not supersede existing College regulations and policies – including the College's non-discrimination and sexual harassment policies – or the laws and regulations of the state of Connecticut and/or the United States of America.

Consequences: System administrators shall have the right to temporarily suspend any user's access to the system without notice where there is reasonable cause to believe such access poses a threat to the security or proper functioning of the system or where it is necessary to comply with the law. Violations of this policy or any other College rules on computer use will be considered grounds for removal of account and network privileges, and where appropriate, other disciplinary action. The College may revoke a user's account and network privileges for violations of law, of this policy or other College policies and regulations, only after notice and opportunity to be heard. Other possible disciplinary action will be determined through referral to the appropriate disciplinary authorities under existing College procedures.