Acceptable Use Policy

Acceptable Use of Computer and Electronic Resources Policy

OVERVIEW

Smith College requires that any person who uses its information technology resources and services must do so in a lawful, responsible and ethical manner, abiding by all applicable laws, regulations and college policies and codes of conduct.

SCOPE

This policy affects all people using information technology resources and services provided by the institution, regardless of their individual affiliation.

POLICY

Introduction:

Smith College provides information technology resources to students, faculty, staff, guests, and other members of the college community for support of its general academic mission. These resources may only be used for lawful purposes, and in a manner consistent with college policies and codes of conduct. These resources include authenticated access to college electronic services, including: access to college-owned computers and electronic devices; local and Internet network access; network file storage; electronic mail (e-mail); phone service and voice mail; licensed software; electronic media content; library electronic resources; and other network-based services and data. The college has established standards and policies for the acceptable use of these resources and expects users to be familiar with and honor them.

In addition, members of the Smith College community may have access to third-party electronic resources through their affiliation with the college, including the resources of the other institutions of Five Colleges, Inc. (Amherst College, Hampshire College, Mount Holyoke College, and the University of Massachusetts Amherst). Use of these resources by members of the Smith College community is governed by this Acceptable Use Policy and also by any applicable policy or restriction of the third-party provider.

Specific Considerations for this Policy:

Actions prohibited by legal or regulatory agencies, and / or this Acceptable Use Policy or the institutional policies of Smith College include but are not limited to:

Legal and Regulatory Acceptable Use Restrictions:

Institutional Acceptable Use Restrictions:

Account Use and Information Access Restrictions:

o For the avoidance of doubt, unauthorized disclosure includes forwarding emails or other documents with personal information or institutional classified information from college email accounts to personal email accounts.

Electronic Communications Restrictions:

Network Use Restrictions:

Additional Considerations for this Policy:

Although all members of the community have a reasonable expectation of privacy, the college reserves the right to examine material stored on or transmitted through any and all of its resources, such as computer disk drives, network drives, e-mail, voicemail, portable devices, other electronic storage media, internet service (including wireless networks), cloud computing, and institutionally contracted information technology services, if there is cause to believe that the standards for acceptable and ethical use are being or have been violated, if there is a threat to an individuals’ safety, or when it has a legitimate work or school administration-related need to do so; and to preserve the contents in response to litigation hold requests, potential legal claims, subpoenas, or other investigations. The College also reserves the right to disclose the contents to law enforcement officials.

The Vice President for Information Technology or their delegate with appropriate consultation must review and approve in advance any request for access to the contents of electronic files, data, or folders on institutional information technology resources without the consent of the user.

Students, faculty and staff who use their personal computer, portable electronic device, portable memory media, or other electronic devices for college-related business may be required to provide access to intact business-related information and possibly the devices themselves when the college has a legally-required reason.

The college reserves the right to access the contents of students' electronic files during the course of an investigation and to disclose the contents during student judicial proceedings.

POLICY VIOLATIONS

Violations of this policy and related college policies should be brought to the attention of policy’s Responsible Executive, and are adjudicated according to procedures outlined in the Student Handbook and the Staff Handbook, with disciplinary consequences imposed by the adjudicating authority up to and including dismissal. Some offenses are punishable under state and federal laws.

DEFINITIONS

These definitions apply to terms as they are used in this policy.

Classified information:

For this policy, “classified information” refers to any institutional information that has been classified by the information owner as requiring some level of access protection or privacy protection.

Protected Information:

For this policy, “protected information” refers to information that is explicitly protected by state or federal law, and specifically MA GL 93H / MA 201 CMR 17.

DHCP:

“Dynamic Host Configuration Protocol” – standard service that issues a network address to a device when it attaches to the local network.

PROCEDURES

Procedures for compliance:

Departments must ensure that internal procedures support compliance with this policy. Review and approval of internal procedures by the policy administrator is recommended.