|
COM-FSM > Committees > Information and Communications Technology Committee > Technology Policy - working draft > Section 4-6
Section 4-6Table of contentsNo headersIV. Computing Resources A.Definition Computing resources include computers, servers, printers, network devices and cabling, and software that is installed or made available by the College of Micronesia-FSM. Resources also include services provided by the campus computer network, such as e-mail and Internet access. B. General The computing resources of the College of Micronesia-FSM are intended to support the academic programs of the College. Anyone pursuing academic work may use the facilities and equipment. Use is limited to curriculum, academic, and College related work. College computing resources may not:
Computing resources are to be considered as shared, finite resources provided by the institution to promote scholarship and learning for all students, staff, and faculty. Monopolizing this shared resource through deliberate action or inaction is strongly discouraged. School related work, such as work for classes, committees, and school projects, has first priority:
The faculty computers are meant to be used by faculty and their designated work study students only. C. Security Attempts to circumvent, defeat, or subvert system or network security measures, or gain access to areas or systems the user is not authorized to access are prohibited. The use of College computing resources, including Internet access provided by the college, D. Learning Resources Center In keeping with the philosophy of the College of Micronesia-FSM and the Library Bill of Rights, the LRC is seen as a resource open to all. Combined with this, the first concern of the COM-FSM LRC is to support the curriculum and the staff and students of the College. Use of computer labs located in the Learning Resources Center is a privilege open to all registered students and those who present a valid library card. However to protect and monitor use of the LRC resources it is necessary to ensure that all users have an understanding of proper computer use and etiquette. There are two different but complementary levels of computer use. Students may elect to use only the general application computers or they might opt to use the Reference computers. Research must be of an academic nature directly connected to an assigned project or connected to a student's academic future (i.e. access to an institution of further education). Any other use is prohibited. The LRC reserves the right to make the determination of whether or not an observed or requested usage is educational.
E-mail access is E. Classroom Labs Use of Classroom computer labs is a privilege extended to staff and students. In order to ensure that the laboratories are productive and pleasant working environments, and to safeguard the College's investment in the equipment, a set of rules and procedures for lab use and monitoring have been established. Lab Monitors (is this the screen/output device itself or the one who monitors?) and instructors supervising the lab are instructed to enforce these rules vigorously and consistently; however, it is expected that the majority of users will see these regulations as commonsense and F. Business Computer Laboratory (some policies mentioned here could also be applied on Classroom Labs. Do we need to address a policy specifically for Business Computer Laboratory or we cound integrate some good points here to Classroom Labs in general?) The computer laboratory will be used for instructional purposes during school hours. The computer lab will be used for training purposes sanctioned by the College and approved by the Vice President for Instructional and Academic Affairs. All training in the business computer laboratory must be passed through the Business Department Chair and be approved by the Vice President for Instructional and Academic Affairs. All the supplies, materials for the lab, will be purchased by the student fees collected at the time of registration. No equipment, computer, or furniture may be removed from the business computer laboratory without the prior permission of the Vice President for Instructional and Academic Affairs. G. Computer Network Use of computer access accounts are subject to state and/or federal laws regarding the use of computing equipment and/or government resources and appropriate network protocols. The institution reserves the right to monitor and record the usage on campus networks and equipment. The institution has the right to use information gained in this way Running network servers of any kind without being logged in to the system (what does 'logged-in to the system' means?) while they are executing is prohibited unless arrangements are made in advance. This includes gopher servers, web servers, IRC servers, or any other server which allows people other than yourself to access your account or computing resources. Privately owned computers may be attached to campus network with the following stipulations:
V. Administrative Data All persons who handle confidential records shall be instructed concerning the confidential nature of such information and their responsibilities regarding it as described in the United States Family Educational Rights and Privacy Act, 1974, Micronesia Board and Education Policy, 1977. No one outside the faculty or administrative staff of COM-FSM, except as specified by law, may have access to the records of a student's offenses against the College's regulations without the express permission of the student in writing. When disseminating information, ensure that the information is sent to only the intended recipients. Be especially careful when releasing information by telephone, fax, or e-mail. When transmitting information over the telephone or fax machine, be certain of the identity of the recipient. When sending information via e-mail, be mindful that e-mail information is particularly easy to forward to third parties. A. Access to Administrative Data Administrators, faculty, and staff are to access only that data and those transactions that are required to conduct their officially assigned duties. Information can only be released according to the guidelines within each unit and in accordance with existing College policies on the release of information. Controls over information systems should provide the ability to trace violations of security to individuals who may be held responsible. Employees who attempt unauthorized access to administrative computers are subject to disciplinary measures as per College policies. Supervisors have the the following responsibilities:
B. Responsibilities of Authorized Users Any person authorized access to any information:
C. Handling of Confidential Information The improper access to or unauthorized disclosure of confidential information is a violation of College policies may be a violation of state, federal, or U.S. laws that pertain to the College. Computer screens must be oriented to prevent unauthorized people from reading sensitive information. Printed output containing confidential or sensitive information must be treated with the same care as confidential data files. Floppy disks, thumb drives, cartridges or any storage device with sensitive or confidential information must be stored in a secure area or in a locked file cabinet or desk. Storage of non-electronic forms of administrative information must safeguard against the information's unauthorized viewing as well as loss due to accidents or acts of nature. D. Disposal of Confidential Information Paper and microfiche copies of sensitive and confidential information must be disposed of either by burning or by shredding to ensure the security of the information. Properly discard computer E. Data Integrity Data integrity will be ensured through the following of the proper maintenance procedures on databases or systems that access database(s) thereof and through timely upgrades of the database software or systems that uses databases to current releases. A naming standard must be in effect to distinguish between test jobs and production jobs, test data sets and production data sets. New procedures should be run in test data sets and off-line data sets. Employees are charged with safeguarding the integrity, accuracy, and confidentiality of information. F. Backup and Storage Data will be secured against loss by regular backing up of the data onto removable media. Data centers may have a fireproof and weatherproof vault for critical electronic data storage such as backup media (tapes, removable disks). Data centers may have an off-site back-up center to prevent loss of important data in the event of natural disaster like earthquake, fire, flooding and the like. VI. Internet Access to the global Internet provided by the College of Micronesia-FSM is considered part of the larger framework of computing resources that are provided to support the academic programs of the College, and is subject to the guidelines established for those resources. Reselling institutional access to the Internet is prohibited. A. Use of Internet Service Providers Where connectivity to the Internet is accomplished by dial-up networking or a broadband technology (e.g. DSL, T-carriers) to an external Internet Service Provider (e.g. FSM Telecommunications), efforts should be made to separate work-related and personal Internet and e-mail usage. All College paid accounts should be used only for work-related activities. Staff who wish to communicate via e-mail or use the Internet for personal business should establish a separate, personal account with an Internet Service Provider. Official College accounts purchased from external Internet service providers should not use personal names for the login, e-mail address, or account holder. A-1. World Wide Web Public access to College computers and networks may be available from the Internet/World Wide Web or from within specially designated public facilities, such as the College library. The primary use of the Internet is for educational and research purposes only.
Non-executable files (such as web pages, text documents, or portable document format) when downloaded for purposes other than immediate viewing, may be saved only on removable media such as floppy disks or thumb drive. A-2 Web Page Content and Use A-3 General Guidelines All pages must use the correct nomenclature for College of Micronesia-FSM. Pages located on College servers may not be used to promote commercial activity, personal business, religious groups, or to promote personal financial gain; except as may be permitted by other College policy or regulation. College pages should not contain confidential university information or confidential student information unless adequate security measures are in place to restrict access to authorized persons. Web pages must observe international copyright laws and acceptable practices related to those laws. The occurrence of plagiarism on web pages is subject to the same sanctions as apply to plagiarism in any other media (See COM-FSM's policy on Academic Honesty). Clip art images provided with licensed software may be used if permitted in the license agreement for such software. You may not place any pictures or videos of people on a Web page without the expressed permission of the people in the picture or video. Every person has a right to privacy which includes the right to restrict the use of his/her own image. In addition, the picture or video may be protected by copyright. Links that lead directly to materials with pornographic or racially derogatory material are not permitted on College web servers. A-4 Institutional Web Pages Institutional Web pages are pages created by any College division. Their content must be consistent with and in support of the College mission statement. Each division head is responsible for assuring that the organization's web pages meet all the College policies, procedures and guidelines. The task of assuring that web pages prepared by the division comply with College policies, procedures, and guidelines can be delegated by the division head to a member of the division with the necessary technical skills. All institutional pages other than "working" pages (i.e. class notes, syllabi, research projects, etc.) orpages designed specifically to provide a source of printed documents must conform to the following design and content standards in addition to the standards listed above: The appearance of all pages should be based on a current web page template, available on the COM-FSM web site. Where use of a template is not appropriate, pages should:
2. contain the name of the College of Micronesia-FSM (completely spelled out) 3. incorporate the official university colors of blue and white into their design 4. contain a link back to the College home page. A signature block containing the following information is also recommended: 5. The date of the last revision to the page 6. The name of the unit responsible for the page 7. An e-mail link to the person responsible for the page 8. A link back to the organization's home page (if any). Organizational pages must also contain an e-mail address for the organization If an organizational page requires graphics or audio to convey the meaning of the page, an alternative "text-only" page must be made available for people who may not be able to view the graphics or hear the audio. Each organization creating pages is responsible for maintaining those pages in a timely manner with the latest information. Organizations creating pages should provide links, if necessary, to pages containing authoritative information outside their areas of responsibility (i.e. policies, admissions, College mission and history, etc.) rather than creating the pages themselves. This is to ensure that the most up-to-date and accurate information is being provided. Careful attention to spelling, grammar, punctuation and word use is required. All official College pages must be cleared through the designated Public Information Officer. Links to commercial sites should be done only where the link serves an institutional purpose. On pages containing such links, the following disclaimer must also appear: "The College of Micronesia-FSM does not endorse the following commercial provider or its products." A-5 Personal Web Pages The College supports the concept of faculty, staff, and student personal web pages. Faculty and staff personal web pages should provide information relevant to the individual's role at the University. The College reserves the right to restrict the quantity and availability of College computing and network resources for the purpose of creating, maintaining, and viewing unofficial web pages and files. All pages must contain the name and e-mail address of the page owner. These may be incorporated as meta-content if appropriate. The College assumes no responsibility for the content of any unofficial web page or file. All personal web pages must include the following disclaimer: "This page does not reflect an official position of the College of Micronesia-FSM." College reserves the right to remove, without notice, any web page or file (official or unofficial) from any computer which is owned and operated by the College or its affiliated units which does not comply with College information resource policies and procedures. Use of the College of Micronesia-FSM's trademarks, official logos, or other intellectual property and creative works is governed by College intellectual property and creative works policies. Personal web pages may not contain the College logo or other symbols of the College unless they pertain specifically to a College function. Personal web pages must not give the impression that they are representing opinions or making statements on behalf of the College or any unit of the College unless appropriately authorized (explicitly or implicitly) to do so. Unauthorized presentation of any web page or file as an Official College Web Page or Official College File or any unauthorized or illegal use of College computers and networks is prohibited. B. E-mail B-1 Usage Guidelines E-Mail is a computing resource provided by the College of Micronesia-FSM, and is therefore subject to use consistent with the guidelines for those resources. E-mail is a form of communication; laws and guidelines of etiquette that apply to other forms of communication apply equally to e-mail. Use of e-mail to harass or intimidate another person, or any other illegal or unlawful purpose is prohibited. Use of e-mail to send chain letters or for "pyramid schemes" is also discouraged. College electronic mail services may be used for incidental personal purposes provided such use does not interfere with College operation of information technologies including electronic mail services, burden the College with incremental costs, or interfere with the user's employment or other obligations to the College. Only messages relating to College activities should be sent to the system wide mailing lists. Such mailing lists are for notification of College events, communication of official College messages, and notification of bulletin board discussions. System-provided mailing lists shall not be used for "classified ads" (e.g., "For Sale," "For Lease," etc.) or "free items" (e.g., free kittens, free books, etc.). Users shall not use the system-provided mailing lists for commercial or partisan political purposes. B-2 Privacy The College of Micronesia-FSM encourages the responsible use of electronic mail and respects the privacy of users. The College does not wish to inspect or monitor electronic mail routinely or to be the arbiter of its contents. Nonetheless, electronic mail and data stored on the College's network of computers may be accessed by the College for the following purposes:
The system administrator will need approval from the Vice President for Instructional and Academic Affairs or the appropriate designee to access specific mail and data for these purposes. The extent of the access will be limited to what is reasonably necessary to acquire the information. Realize that College policy and secure passwords provide good but not complete assurance of the privacy of your e-mail messages. Receivers of electronic mail documents should check with the purported sender if there is any doubt about the identity of the sender or the authenticity of the contents, as they would with print documents. When the confidentiality of a message is of the utmost importance, only a person-to-person conversation may be sufficiently secure. Electronic mail may constitute a public record and, like other documents, be subject to disclosure as a result of litigation. The College evaluates all requests for information prior to such disclosure. Users of electronic mail services should be aware that even though the sender and recipient have discarded their copies of an electronic mail message, there may be back-up copies of such electronic mail that can be retrieved. |