This Policy applies to the use of electronic devices by IST students and personnel.
1. Establishment of Policy
This Acceptable Use Policy for Technology (“AUP”) establishes the Institute of Science and Technology (“IST”) guidelines for the use of IST and personally owned electronic devices, that access or use in any way external electronic bulletin boards, wire services, online services, intranet, Internet and the World Wide Web, through IST’s electronic communications system and/or on-line services (the “Network”). All users of the Network and devices that connect to the Network have the responsibility to use these resources in a professional, ethical, and lawful manner.
While no policy can establish rules to cover every possible situation, this policy sets forth, IST’s philosophy and general principles for the use of electronic media and services in supporting leaning, enhancing instruction, and assisting in IST administration. All students and staff members must have a signed AUP form on file before they have access to technology and Internet services.
2. Acceptable Use
The purpose of the IST’s Network is to support research and education in and among institutions by providing access to unique resources and the opportunity for collaborative work. All use of the Internet and Network must be in support of education and research and be consistent with the educational objectives of the IST. Use of other networks or computing resources must comply with the rules governing those networks. Transmission of any material in violation of any federal or state laws or regulations are prohibited; this includes, but is not limited to, copyrighted material, threatening or obscene material, or material protected by trade secret. Access to computer Networks and Networks owned or operated by the IST is subject to internal policies and local, state, and federal laws.
Acceptable use is always ethical, reflects honesty, and shows restraint in the consumption of shared resources. It demonstrates respect for intellectual property, ownership of information, Network security mechanisms, and the individual’s rights to privacy and freedom from intimidation, harassment, discrimination, and unwarranted annoyance.
The IST will have the following in continuous operation, with respect to any computers belonging to the IST and having access to the Internet:
- A qualifying technology protection measure designed to block or filter internet access to pictures that are: (a) obscene; (b) child pornography; or (c) harmful to individuals; and
- Procedures or guidelines that provides for monitoring the online activities of users and the use of the chosen technology protection measures to protect against access through such computers to visual depictions that are obscene, pornographic, or in violation of policies, as those terms are defined by the IST Board of Directors (the “Board”).
Such procedures or guidelines will be designed to accomplish to following:
- Provide for monitoring the online activities of users to prevent, to the extent practicable, access by individuals to inappropriate matter on the Internet and the World Wide Web;
- Promote the safety and security of individuals when using electronic mail, chat rooms, and other forms of direct electronic communications;
- Prevent unauthorized access, including so-called “hacking,” and other unauthorized activities by individuals online;
- Prevent the unauthorized disclosure, use and dissemination of personal identification information regarding individuals; and
- Restrict individuals’ access to materials “harmful to individuals,” as that term is defined by the Board.
Pursuant to Federal law, students shall receive education about appropriate on-line behavior, including: (a) access by individuals to inappropriate matter on the Internet; (b) the safety and security of individuals while interacting with other individuals on social Networking websites, using e-mail, chat rooms, other forms of direct electronic communications, and cyberbullying awareness and response; (c) unauthorized access (e.g., “hacking”) and other unlawful activities by individuals on line; (d) unauthorized disclosure, use, and dissemination of personal information regarding individuals; and (e) measures restricting individuals’ access to materials harmful to them.
3. Availability of Access
The IST will make access to the IST’s Network, including the Internet, available to students and employees exclusively for instructional and administrative purposes and in accordance with administrative rules.
Access to the IST’s Network is a privilege, not a right. All users will be required to acknowledge receipt and understanding of all administrative rules governing use of the Network and will agree in writing to comply with rules and guidelines. Noncompliance with applicable administrative rules will result in disciplinary action consistent with IST policies and administrative rules up to and including termination of employment or expulsion of students. Violations of law may result in criminal prosecutions, as well as disciplinary action by the IST and or its affiliates.
In order to enhance the learning experience, students may bring personally-owned computers or other web-enabled devices to IST for use in educational and other activities (“Bring Your Own Devices” or “BYOD”) as approved by a teacher and/or administrator (a “IST Official”). Pursuant to BYOD, students will be allowed to access the Network for approved activities, projects, and/or assignments. Because the Network is meant to support educational progress, personal uses are severely limited.
Some types of devices or their use may pose problems to the Network. Therefore IST reserves the right to approve the types of devices allowed to access the Network. Approval of a type of device is subject to change at the IST’s sole discretion at any time. All approved devices must allow access to the Internet through a fully functional web browser and be capable of accessing IST’s Wireless Guest Network. Cellular Network adapters are not permitted to be used by students to access the Internet at any time at any time IST’s network is functional.
The use of personal technology to provide educational material is not a necessity but a privilege. A student does not have the right to use his or her laptop, cell phone, tablet, or other electronic device while at IST. IST will establish and enforce rules governing when and where computers, tablets, iPods, mp-3 players, personal cell phones, etc. (collectively “Devices”) may be used.
IST accepts no responsibility for Devices or personal property brought to the IST. Personally owned Devices that are stolen or damaged are the responsibility of the student. IST’s information technology personnel are not responsible for repairing and/or maintaining privately-owned Devices. The owner of the Device is solely responsible for ensuring that the device is in good working order.
Students participating in BYOD must adhere to all other IST policies, the AUP and the following rules:
- The Device will not be used in the hallways, bathrooms, or open spaces unless otherwise directed by a IST Official. Students are prohibited from using head phones or ear buds in the classrooms, bathrooms, or administrative areas unless otherwise directed by an IST Official.
- The Device must be in silent mode while on the IST campus unless otherwise directed by an IST Official.
- Personal Phone calls are not permitted in classrooms, open spaces of the facility, or hallways at any time. Students are encouraged to make phone calls outside of the facility or in specifically designated calling areas.
- The Device may not be used to cheat or assist cheating on assignments or tests or for non- instructional purposes during instructional time.
- The Device may not be used to record, transmit or post photographic images or video of a person, or persons on campus during IST activities and/or hours unless assigned by an IST Official as allowed by the Acceptable Use Policy.
- The Device may only be used to access files or internet sites which are relevant to the classroom curriculum. Non-instructional games are strictly prohibited.
- Students must comply with an IST Official’s request to turn off the Device.
Students must acknowledge and agree that:
- The IST’s Network filters will be applied to all access to the internet and should not be circumvented. Any attempt to circumvent the filters is a violation of the Acceptable Use Policy and will subject the user to loss of privileges, discipline, and/or referral to law enforcement.
- The IST may take possession of and examine any Device when IST personnel observe or reasonably suspect that a Device is being used in violation of these rules or that a search is required to discover evidence of a violation of law or other IST rules, including but not limited to the Acceptable Use Policy.
- The student remains subject to all other IST behavior rules and the Code of Conduct. Violation of the BYOD provisions of this policy may lead to discipline under the Code of Conduct and/or confiscation of the Device. The Device may be confiscated even if the student does not own the Device. Confiscated Devices will be released to the student when the disciplinary consequences have been served or at the end of the IST school session, whichever is sooner.
4. Monitored Use
Students and employees should have no expectation of privacy in their use of the Network and/or their use of the Network to transmit or receive electronic mail or other messages. Designated staff may monitor these actions at any time to ensure appropriate use for educational or administrative purposes, for maintenance or repair, or for no designated reason.
5. Disclaimer of Liability
Users accept all risks attendant upon the use of the Network, without exception. IST will not be liable for loss, damage, inconvenience, or any other harm or damages resulting from the use of IST’s Network, including but not limited to user misuse including violations of copyright restrictions, users’ mistakes or negligence or costs and/or charges for service incurred by users. The IST is not responsible for ensuring the accuracy or usability of any information found on the Internet, or for the suitability of the Network for any particular use.
The Chief Information Officer or his/her designee (the “CIO”) will oversee the IST’s Network and is the final authority over any and all aspects of its use. Oversight of the posting of official IST or division/department materials on the Network will be the responsibility of the CIO. The Network will be used only for administrative and instructional purposes consistent with IST’s vision, mission, and goals.
It is the goal of the IST to provide training for students. Management or teachers will answer any user questions regarding the proper use of the Network and provide copies of the IST’s acceptable use guidelines for users. Teachers and managers will emphasize ethical use of the Network’s resources.
Users shall abide by copyright law, and shall respect the intellectual property rights of authors and creators without exception. Violation of copyright may lead to disciplinary action up to and including termination or the expulsion of students. Copyrighted software or data may not be placed on any Network connected to the Network without documented permission from the holder of the copyright. Only the Director or individuals the Director specifically authorizes (e.g., CIO) may upload copyrighted material to the Network.
8. Network Access
Access to the Network will be governed as follows:
- With the approval of the Director or division/departmental supervisor or his/her designee, users will be granted appropriate access to the Network subject to this policy and all applicable policies, regulations, and law.
- Any Network users identified as having violated IST, campus and/or division/department Network acceptable use guidelines, policies, or law will be subject to disciplinary action consistent with IST policies and administrative rules up to and including termination of employment or expulsion of students.
9. Chief Information Officer (“CIO”)
The CIO or his/her designee for the electronic communication Network will do the following:
- Disseminate and enforce applicable IST policies and acceptable use policies for the IST’s Network
- Ensure that all users of the IST’s Network complete and sign an agreement to abide by IST policies and administrative rules regarding such use
- Ensure that all employees supervising students who use the IST’s Network provide education and training emphasizing the appropriate uses of these resources
- Monitor or examine Network activities as appropriate to ensure proper use of the Network
- Set limits for storage of data and other technical parameters for users of the Network, as needed or as directed from IST level technology staff.
10. Individual User Responsibilities
10.1 Acceptable Use Activities in direct support of teaching and learning, such as professional development, administrative communications, grant applications, new project announcements and student product publishing, are acceptable. It is the general policy that IST Network facilities are to be used in a responsible, efficient, ethical, and legal manner in accordance with the instructional mission of the IST, the acceptable use and other IST policies, and applicable local, state, and federal law(s). Faculty and students must acknowledge by signature their understanding of the general policy and guidelines and their agreement to abide by those policies as a condition of receiving access to the Network.
10.2 Standards of Acceptable Use Failure to adhere to this policy and the standards within may result in disciplinary action, including revocation of the offender’s Network access privilege by the CIO, termination of employment and expulsion of students. Willful misuses may lead, in addition to serious disciplinary action, to criminal prosecution under applicable state and federal law. IST’s standards do not attempt to articulate all permitted or prohibited behavior by users and require application of common sense in light of the purpose and general policy for Network and Internet access. The Director shall have the final authority over decisions regarding acceptability of use. It is the responsibility of users to seek the approval and guidance of management or teaching staff if there is any question of the acceptability of a specific proposed use, and the responsibility of such managers or teachers to seek appropriate guidance in cases of uncertainty.
10.2.1 Standard One Acceptable uses of the Network are activities which support learning and teaching. The IST encourages Network users to develop uses which meet their individual needs and which take advantage of the Network’s functions, including but not limited to the following:
- Educational Sources,
- Internet Resources,
- Reading Material,
- Conferences, and
10.2.2 Standard Two Unacceptable uses of the Network include, but are not limited to, the following:
- Accessing the password protected materials of any student or employee, or of any third person or entity
- Transmitting profanity, obscenity or other communications in any form or medium which may be offensive to the recipient to any individual, group, web site, news group, mailing list or similar forum
- Downloading, storing or printing files or messages (text, sound, still, moving graphics, or any combination thereof) that are pornographic or obscene or that use language,
- sounds or imagery which offends or tends to degrade others (the Director or CIO shall have the final authority to determine suitability in particular circumstances)
- Transmitting any material which is threatening to another person, group or the general community, whether or not such material is transmitted to that third person
- Copying proprietary information, including software, in violation of applicable law and policy
- Using the Network for personal financial gain, business activity not on behalf of the IST or any illegal activity
- Knowingly or negligently transmitting or opening the Network to the reception of computer viruses and other malware or failing to scan downloaded files for viruses
- Deliberately trying to degrade or disrupt Network performance (such acts will also be viewed as criminal activity under applicable state or federal law)
- Re-posting personal communications without the author’s prior consent
- Transmitting product advertisement, political lobbying, chain letters or “spamming”
- Personal use not related to educational purposes, including the playing of games
- Knowingly or maliciously falsifying or corrupting data, including changing grades, attendance data, financial data, etc. for personal gain or vandalism purposes
- Any other use deemed not consistent with the IST policy or mission in the sole discretion of the Director
- Purchasing items via a credit card number or other electronic payment Network or obligating another staff member, student, or the IST to pay
- Sending or receiving messages or information with someone else’s name
- Participating in any electronic “chat” unless it is for specific educational purposes, authorized in advance and directly supervised by staff
- Using the network to access media files for personal non educational enjoyment
- Accessing offsite personal e-mail accounts during scheduled classtimes
- Using the Network for any purpose that wastes the time of employees and/or students, or that wastes limited Network resources including but not limited to printing supplies and bandwidth
10.2.3 Standard Three Employees and students may have their own IST e-mail accounts. Teachers will act as sponsors for students using any e-mail accounts set up for classroom use. Student E-mail accounts are secured for educational purposes only; no individual student account will be created for the general use of a student. Users have no expectation of privacy in any communication made using the Network or information stored on the Network, and IST reserves the right to access and review all electronic messages transmitted on any Network provided by the IST Network. Sponsors are responsible for guiding student access to appropriate sections of the Network and for assuring that students understand that misuse of the Network may cause them to lose their accounts and/or face disciplinary action. Where appropriate, sponsors will assume responsibility for teaching the students proper techniques and standards for participation and explaining issues of privacy, copyright infringement, tool use, and Network etiquette.
10.3.4 Standard Four All users will abide by prevailing etiquette rules for net usage, including etiquette rules specific to a web site, news group, mailing list or other forum, and shall not violate the terms of service of any such service or forum.
10.3.5 Standard Five The Network may not be used for illegal purposes, in support of illegal activities or for any other activity prohibited by IST policy or not in keeping with IST’s mission or moral standards of the community.
10.3.6 Standard Six (Password Policy) Network users may not use another person’s Network or e-mail ID or password or share their own with others. Each individual is responsible for the confidentiality of his/her personal password, any password assigned to him/her for the purpose of fulfilling an assigned job task, or any link provided the student to access information/files maintained in the IST’s offsite servers/services (the “IST Cloud”). The individual will be responsible for breach of security caused by the sharing of passwords or restricted log-ins. IST will cooperate fully with local, state, or federal officials in any investigation concerning or relating to misuse of a password, such as using it to enter a program for the sole purpose of gaining confidential information, changing data or placing false information or data into the Network or doing the same over the internet. IST may limit, suspend, or revoke a Network user’s access to IST’s Network upon violation or misuse of any password, or take disciplinary action up to and including termination of employment or expulsion of a student.
10.3.7 Standard Seven Network users will maintain electronic information in accordance with established guidelines.
10.3.8 Standard Eight Network users may not upload programs to IST’s Network or download and install programs from internet sources without appropriate authorization from the CIO.
10.3.9 Standard Nine Network users may not knowingly bring prohibited materials into/onto IST’s Network.
10.3.10 Standard Ten (Personal Safety) Network users will not post personal contact information about themselves or other people. Personal contact information includes personal address and telephone numbers. Network users will abide by all Local, State, and Federal laws and IST policies relating to the privacy of students and their families, and will not allow such data to come into the possession of any unauthorized user. Students will promptly disclose to their teacher or other IST employee any message they receive that is inappropriate or makes them feel uncomfortable, or any solicitation by any person to meet, exchange personal information, or make contact in any form.
Users who violate these standards may be subject to disciplinary action in accordance with IST policy and/or legal actions.
11. Vandalism Prohibited
Any malicious attempt to harm or destroy IST equipment or materials, data of another user of the IST’s Network or any of the agencies or other Networks that are connected to the Internet is prohibited. Deliberate attempts to compromise, degrade or disrupt Network performance may be viewed as violations of IST policies and administrative rules and, possibly, as criminal activity under applicable state and federal laws. This includes, but is not limited to, the uploading or creating of computer viruses.
12. Forgery Prohibited
IST prohibits forgery or attempted forgery of electronic mail messages. Attempts to read, delete, copy or modify the electronic mail of other Network users or deliberate interference with the ability of other Network users to send/receive electronic mail is prohibited. This does not, however, limit or modify in any way the IST’s right to monitor use.
13. Limitation, Termination, and/or Revocation of Privileges
IST may limit, suspend, or revoke a Network user’s access to IST’s Network, or take disciplinary action up to and including termination of employment or expulsion of a student upon violation of any of IST policy or administrative rules regarding acceptable use.
Network users and students with access to IST’s Network should be aware that use of the Network may provide access to other electronic communication Networks in the global electronic network that may contain inaccurate or objectionable material.
15. Safety Issues
IST’s Network is provided on an “as is, as available” basis. IST does not make any warranties whether express or implied with respect to any services provided by the Network and any information or software contained therein. IST does not warrant that the functions or services performed by, or that the information or software contained on, the Network will meet the Network user’s requirements or that the Network will be uninterrupted or error-free or that defects will be corrected. Opinions, advice, services, and all other information expressed by Network users, information providers, service providers or other third party individuals in the Network are those of the providers and not the IST. Users shall not imply to any person or group that their communications over the internet represent the views or position of the IST unless such communication has been previously approved as official.
IST will cooperate fully with local, state, or federal officials in any investigation concerning or relating to misuse of IST’s Network.
16. Internet Access
Because technology is a vital part of the administrative and educational process and the curriculum of the IST, students and staff will be provided access to the Internet when appropriate. By providing this access, the IST intends to promote excellence by facilitating resource sharing, innovation, communication, and learning and by allowing access to resources unavailable through traditional means. Through the Internet, students and staff will have access to the following:
- Locally Networked reference and research sources;
- Worldwide and local electronic mail services;
- Global information and news;
- Public domain and shareware computer software of all types;
- Discussion groups on a vast range of topics; and
- Local, regional, public, state, and national library catalogs
The availability of Internet access provides a unique opportunity for students and staff to contribute to IST’s presence on the World Wide Web. This medium of communication provides an opportunity to share accurate information with the community, state, and world about the IST’s curriculum and instruction. This resource serves as an educational tool for staff and students, and its use will be governed by the Internet Acceptable Use policy. Failure to follow these policies or responsibilities may result in the loss of privileges or other disciplinary measures.
With access to computers and people all over the world also comes the availability of materials; however, on a global Network it is impossible to control access to all materials, and the valuable information and interaction available on this worldwide Network far outweighs the possibility that users may procure material that is not consistent with the educational goals of the IST.
The smooth operation of the Internet through the IST Network relies on the proper conduct of the end users who must adhere to strict guidelines. These guidelines are provided so that students and staff are aware of their responsibilities when using the Internet. Any violations of these guidelines will subject the user to appropriate disciplinary action and possible denial of access to the Internet. In general, this requires efficient, ethical, and legal utilization of the Network resources.
Because access to the Network provides connections to other computer Networks located all over the world, users must understand that neither IST nor any IST employee controls the content of the information available on the Network. Reasonable efforts will be made by IST to monitor and restrict ready access to known objectionable sites, but the doses not guarantee such site will be inaccessible. IST does not condone the use of objectionable, controversial, or offensive materials and cannot be held responsible for such use.
16.1 Procedures for Use Staff may access the Internet for educational or work- related purposes at any time and in a manner which is not disruptive and does not interfere with the performance of other responsibilities by the employee or other staff members. Students will be allowed to access the equipment and obtain Internet access only through their teachers outside of class time unless such class directly involves internet usage. No students may use IST computers to access the Internet without explicit permission, and such access is NOT for the student’s general use but for specific activities related to their education. Student use of IST computers must be supervised at all times by an IST staff member.
16.2 Rules Governing Use The use of the Internet is a privilege, not a right, and inappropriate use will result in cancellation of Internet privileges and/or disciplinary action up to and including termination of employment or expulsion of students. All staff and students must abide by the generally accepted rules of Network etiquette, including, but not limited to, the following rules.
- Be polite. Do not be abusive in messages to others. Always use appropriate language. Profanity, vulgarities, or other inappropriate language is prohibited. Illegal activities are strictly forbidden.
- Documents may not include a person’s social security number or any other personally identifiable information that may lead to the identity of one’s self or others. (For example, do not reveal personal home addresses or phone numbers to others.)
- No staff or student pictures (video or still) or audio clips will be published. Posting of photos and other personally identifiable information may violate IST policy as well as State and Federal law.
- No original student work will be published without written permission from the student.
- Users have no expectation of privacy in Electronic mail. Administrators who operate the Network have access to all mail. Messages relating to or in support of illegal or inappropriate activities will be reported to the appropriate authorities.
- Do not disrupt, harass, annoy, or discriminate against other users.
- All communications and information accessible via the Network should be assumed private property. Always cite all quotes, references, and sources.
- Never access inappropriate or restricted information, such as pornography or other obscene materials, or other information not directly related to the educational purposes for which access is being provided. Restricted information includes obscene, libelous, indecent, vulgar, profane, or lewd materials; advertisements for products or services not permitted to individuals by law, materials whose content advocates and supports violence and/or the harassment of others; and other materials which may cause a substantial disruption of the academic environment in the sole discretion of the administration. All subject matter on IST Web pages shall relate to administration, programs, curriculum, instruction, IST Policies, IST-authorized activities, or to IST.
- Neither students nor staff may publish personal home pages as part of an IST Web site or home pages for other individuals or organizations not directly affiliated with the IST.
- Vandalism is prohibited and will result in cancellation of privileges; at the maximum, the penalty may be termination of employment or expulsion of students. Vandalism includes any malicious attempt to harm or destroy data of another user, Internet, or other Networks that are connected to any of the Internet infrastructures. Vandalism also includes, but is not limited to, the uploading or creation of computer viruses, deletion, or alteration of other user files or application, removing protection from restricted areas, or the unauthorized blocking of access to information, applications, or areas of the Network.
- All users should remain on the Network only as long as necessary to complete their work, so that other individuals will have equal opportunities to access the Internet.
- All users should use the Internet only for research and academic reasons. Users may not use the Network for financial or commercial gain or for personal purchases or trading.
- All pages on the IST’s server(s) are property of the IST.
- Always follow the instructions of the supervising staff members.
- Do not share passwords. The only person who should ever use an account is the person to whom it belongs.
- Adhere to “public performance,” not just “fair use” copyright laws on web pages
The following list represents some inappropriate uses, prohibited by IST, but this list is not intended to be exhaustive:
- Commercial advertising, fund-raising, or unethical/illegal solicitation
- Accessing a file or Web site that contains pornographic or obscene pictures, videos, stories, or other material, making copies of such material, or distributing or exposing others to such material
- Using copyrighted material without permission
- Sending obscene, profane, racist, sexist, inflammatory, threatening, or slanderous messages or materials
- Creating and/or placing a computer virus/worm on the Network or any workstation
- Sending messages or information with someone else’s name on it or misrepresenting the source of information
- Sending or receiving messages or information that is inconsistent with the IST’s conduct code or encourages and/or assists others to violate that code
- Requesting or distributing addresses, home phone numbers, or other personal information
- Sending chain letters or engaging in “spamming” (sending annoying, unnecessary, or unsolicited messages to large numbers of people.)
- Purchasing something which requires a credit card number or other payment network or obligates a student or IST to provide payment to another party
- Accessing, attempting to access, and /or altering information in restricted areas of any network
- Downloading or loading any software applications without permission from the CIO
- Violating the confidentiality rights of other users on any network
- Failing to report abuses or other conditions that may interfere with the appropriate and efficient use of IST’s resources
- Using IST’s technology resources in order to create electronic forgery
- Using scanners for any purpose other than IST business or educational purposes
- Accessing chat rooms unless participating in an educational chat room while under a teacher’s supervision (for students) or approved by supervisor (for staff).
- Prohibiting the usage of video/digital cameras for any purpose other than supporting the IST’s mission
Users are required to report any of the following to his/her teacher, school official, or CIO as soon as the following are discovered:
- Any messages, files, Web sites, or user activities that contain materials that are in violation of this policy
- Any messages, files, Web sites, or user activities that solicit personal information, such as an address, phone number, about the user or someone else, or request a personal contact with the user or another user
- Introduction of malicious software onto the Network and/or jeopardizing the security of IST’s electronic communications systems
- Attempts by any user to abuse or damage the Network or violate the security of the Network and its sources
- Any illegal activity or violation of IST policy
- Any error messages or problems that indicate that the Network is not working properly
16.3 Penalties for Improper Use An employee who violates the terms of this administrative rule or otherwise misuses the Internet to access or send inappropriate material will be subject to disciplinary action, up to and including discharge. In addition, the privilege of accessing the Internet also will be subject to cancellation for a period determined by the IST Director, CIO, and senior IST staff (collectively the “Administration”). Students who violate the terms of this administrative rule or who otherwise misuse their access to the Internet also will be subject to disciplinary action as seen appropriate by the Administration, up to and including expulsion. Internet access privileges also may be canceled over a period determined by the Administration. Violations of the laws of the United States or the State of New Jersey also may subject the user to criminal prosecution. If a user incurs unauthorized costs, the user will be responsible for all such costs.
16.4 Warranty IST makes no warranties of any kind, whether express or implied, for the Internet service it is providing. IST will not be responsible for any damages suffered by any user. This includes loss of data resulting from delays, non-deliveries, misdirected deliveries, or service interruptions caused by the Network’s negligence, user errors, or omissions. Use of any information obtained via the Internet is at the user’s own risk. IST specifically denies any responsibility for the accuracy or quality of information obtained through its services.
16.5 Security Security on any computer Network is a high priority, especially when the Network involves many users. If you believe you have identified a security problem on the Network, you should notify the Administration. Do not demonstrate the problem to other users. Attempts to log on to the IST Network as a Network administrator will result in cancellation of user privileges and other disciplinary action. Any user identified as a security risk or having a history of problems with other computer Networks may be subject to severe restriction or cancellation of privileges. Abusers agree to accept repair assessment charges for their damage or intentional misuse of the Network.
16.6 User Privacy IST reserves the right to examine, restrict, or remove any material that is on or passes through its Network, just as it does any other work or material generated or brought to IST by staff or students. Access to electronic information related to any student or staff member will be governed by the similar policies that would apply to that information if it were not in electronic form.
16.6 IST Policies All documents on the IST’s server(s) must conform to IST policies and regulations. Persons developing or maintaining Web documents are responsible for complying with these and other policies. Some of the relevant issues and related IST policies include the following:
- Electronic transmission of materials is a form of copying. As specified IST policy, only lawful copies of copyrighted materials may be knowingly produced or transmitted via the IST’s equipment, including its Web server(s).
- Documents created for the Web and linked to IST Web pages will meet criteria for use as an informational, administrative, or instructional resource.
- Any links to IST Web pages that are not specifically curriculum related will meet the criteria established in the IST Internet Authorized Use Policy. Any other non- curricular materials should be limited to information about other activities, agencies, or organizations which are known to be non-sectarian, exclusively devoted to community interests or individual welfare, nonprofit, and non- discriminatory. Web page links may not include entities whose primary purpose is commercial or political advertising
- All communications via IST Web pages will comply with the IST Internet Authorized Use policy and the IST Code of Conduct policy. Offensive behavior that is expressly prohibited by this policy includes any advocacy of, support for, or actual religious, racial, and sexual harassment and/or violence.
- Any student information communicated via IST Web pages will comply with IST policies on Data Privacy and Public Use of IST Records.
Given the rapid change in technology, some of the technical standards outlined in this policy may require change throughout the year. Such changes will be made by the CIO with approval of the Director. This Web page policy may be updated on an annual basis, or more frequently if required. Users agree that they will be bound, after reasonable notice, by such updates as if they were a part of the original policy.
18. Code of Conduct
This Code of Conduct applies to all users of these technology resources. Honesty, integrity, and respect for the rights of others should be evident at all times. Photographs may only be permitted with current, signed photo release on file. Students will not be identified by name in conjunction with a recognizable picture. Students will only be identified by first names.
The technology user is held responsible for his/her actions and activities. Unacceptable uses of the Network will result in disciplinary action including possible revocation of these privileges
USER (Student or Staff) TECHNOLOGY CONTRACT
Directions: After reading the Institute of Science and Technology (“IST”) Code of Conduct and Terms and Conditions, please read and fill out the appropriate portions of the following contract completely and legibly. Please return this contract to IST’s Chief Information Officer or an IST administrator
I, the User named below, have read the Institute of Science and Technology’s Acceptable Use Policy (“AUP”). I understand and will abide by the regulations. I understand misuse is unethical and illegal. Should I commit any violation, my access privileges may be revoked and disciplinary action will be taken. A signed copy of this document must be on file with the administration.