Acceptable Use Policy for Technology  Resources

1.  Introduction

Elms College provides computing resources to support the academic, research, and administrative activities of the College.  The College has an interest in maintaining the security of these resources and ensuring its proper usage and care.  The use of computing resources is a privilege that is extended to members of the Elms College community.   The College encourages all members to use electronic communications and other information technology resources in a manner that is legal, respectful, responsible, and ethical.

2.  Scope

This policy applies to all individuals accessing or using Elms College computing resources. Individuals covered by the policy include Elms College faculty, adjunct faculty, staff, students, alumni, guests, external organizations, contractors, and the general public utilizing Elms College computing resources and facilities. 

Computing resources in this policy include all College owned, managed, licensed or leased hardware, software, servers, data, email, Internet access, physical/wireless network connections and equipment, copiers, printers, scanners, fax machines, telephone and cellular systems, and voice mail.  In addition, any technology which connects to the College’s computing resources, regardless of ownership is subject to this policy.

3.  Rights and Responsibilities

Elms College provides members of the community with access to a wide range of computing resources.  Members should have a reasonable expectation of privacy when using these resources and of protection from abuse and intrusion from others when used in a manner that is respectful, responsible, ethical and legal.  

The College respects the confidentiality and privacy of all members, including the rights and obligations of academic freedom as defined by the AUP.  Accordingly, the College will not engage in examinations of information technology resources unless such examination is necessary to protect the interests identified in Section 4 of this policy or are otherwise required by law. 

Users are responsible for complying with all College rules and policies governing the use of computing resources, contractual obligations, and licenses.  Users must comply with all applicable federal, state, and local laws, and regulations governing electronic communications.   

The computing resources of other organizations that are reachable via the Elms College network may have separate policies governing their use. Users are responsible for abiding by both the policies set forth in this document and the policies of the other organizations when accessing remote resources.

4.  Acceptable Use Policy

4.1.  Compliance

Users agree to comply with the Acceptable Use Policy and all other computing related policies and applicable laws when using and accessing Elms College computing resources. 

4.2.  Federal, State and Local Laws

All members of the Elms College community are expected to abide by federal, state and local laws, regulations and licenses. College policies related to use of information technology and computing resources originate from laws regarding license and copyright, and the protection of intellectual property. 

Elms College has legal agreements and contracts for many network, hardware and software resources which require all users to comply with the terms of the agreements.  Users must observe the copyright laws applicable to music, media, video games, images, text, and other media in both personal use and in production of electronic resources.  Since electronic information can be easily copied, reproduced, and sent electronically, users may not use, copy, or distribute copy righted works unless legally authorized.  

Email and other electronic messages are, for legal purposes, treated as a written record, and are therefore subject to all the normal legal restrictions on such records, including FERPA, HIPAA, and copyright and intellectual property laws.  

4.3.  Contracts and Licenses

Elms College is bound by its contractual and license agreements with third party vendors, resellers and other associations.  Users are expected to comply with all agreements and licenses when using computing resources.

4.4.  Resources and Capacity

The campus network, servers, computer labs, and other computing resources are shared and must be utilized with consideration for all members of the community.  Excessive or inappropriate use of computing resources by one individual or group may degrade performance for others.   

The College reserves the right to limit resources through quotas, time limits, filtering, and other methods to ensure that these resources can be used appropriately.

4.5.  Access and Restrictions

4.6.  Passwords

4.7.  Inappropriate Activities 

The following actions are inappropriate and may lead to disciplinary action:  

4.8.  Personal Use

All computing resources owned by Elms College, and data and files created using Elms College computing resources (including Elms College email accounts and messages) are the property of the College and are to be used solely to facilitate the business and academic mission of the College. Intellectual property rights regarding content created by faculty or students are governed by the Intellectual Property Rights Policy.  Material may not be copied or transmitted to an outside party or used for any purpose not directly related to College business or academic or research endeavors endorsed by the College.   

Computing resources owned by Elms College should contain only software and accessories needed for the performance of College business and purchased by and properly registered to the College.  Users should refrain from using College owned resources for personal or commercial financial gain, and other advantages not related to the academic mission of the College.  

Students are advised to use computing resources primarily for academic purposes.  Personal use is permitted unless such use interferes with the study or working environment of other users or the mission of the College.  

4.9.  Privacy

The College respects academic freedom and the confidentiality and privacy of its members and does not routinely monitor or limit content of information transmitted on the campus network.   However, the College reserves the right to examine all College owned computing resources, files, emails, databases, and network activity if there is reasonable belief that there has been intentional disruption to the College’s network or other shared resources or if there is suspected violation of College policies or applicable laws. 

The College will take steps to enforce policies regarding: 

Computers or files may also be subject to search by law enforcement agencies under proper procedures or when properly requested, subpoenaed or ordered by a court.    

5.  Enforcement

The Acceptable Use policy is meant to ensure availability and quality of service of Elms College computing resources and compliance with licenses, contracts, laws and regulations.  If an individual is found to be in violation of the Acceptable Use Policy, the Office of Information Technology will work with Academic Affairs, Student Affairs, Campus Public Safety, Human Resources and/or legal counsel to ensure fair and appropriate investigation. 

Failure to abide by the Acceptable Use Policy may result in actions including: