TBR guidelines can be found here. P2P file sharing is against institutional policies. The use of file sharing or torrents is against TBR and TCAT Shelbyville's policies. See HEOA and P2P information. The institution encourages the use of mobile and portable devices in classrooms and throughout the institution. All devices attaching to TCAT Shelbyville's network is subject to monitoring. Devices found in violation of TCAT Shelbyville policies will be removed from the network because of copyright laws and for security. IT Resources Policy I. Purpose The Information Technology Resources Policy identifies appropriate use of Information Technology Resources (as defined in Section III:A) to support the Technology college's goals and objectives. This document informs all Users (as defined in Section III:F) of the policies set forth by the Tennessee College of Applied Technology - Shelbyville (TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE), the Tennessee Board of Regents (TBR) Policy 1:08:00:00 (Information Technology Resources) and the laws of the State of Tennessee and the Federal government. II. Objective The objective of this policy is to assure that the use of Information Technology Resources is related to, or for the benefit of, TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE, the TBR, and the State of Tennessee. The use of Information Technology Resources is a privilege that imposes certain responsibilities and obligations on users and is subject to policy and applicable law. Acceptable use must be legal, ethical, reflect honesty, and show restraint in the consumption of shared resources. It demonstrates respect for intellectual property, ownership of information, system security mechanisms, and the individual's rights to privacy and freedom from intimidation, harassment, and unwarranted annoyance. III. Definitions • ”Information Technology Resources" are computing, electronic storage, communication, and presentation resources provided by TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE. • The "Infrastructure Sponsor" is the person responsible for the TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE Information Technology Resources infrastructure. The Infrastructure Sponsor is the Asst. IT Manager for Information Technology and IT Manager (). • A "System Sponsor" is the individual(s) under whose authority a computing system, local network, or external network connection is funded. Individual computer systems and local networks may be sponsored by faculty members (e.g., using research grant funds), or by departments, colleges, or other units. In the latter case, the unit administrator is the System Sponsor. • A "System Manager" is the person(s) authorized by a System Sponsor to grant, restrict or deny user privileges, maintain the system files, inform users of all applicable policies, and generally ensure the effective operation of a system. In some cases, the System Manager and the System Sponsor may be the same individual(s). • "Facility Staff" are the individuals who are authorized to monitor, manage, or otherwise grant temporary access to computing facilities (such as microcomputer laboratories) in which one or more systems are used on an open access basis by either specific populations of faculty, staff, and students, or the entire campus community. • A "User" is any individual who uses, logs in, attempts to use, or attempts to log in to a system (whether by direct connection or across one or more networks) or who attempts to connect to or traverse a network, whether via hardware, software, or both. • An "Account" is a combination of username and password that provides an individual with access to an Information Technology Resource. • "Content" is any and all text, images, multimedia elements, coding, and other such items posted, transmitted, and/or used by Information Technology Resources. IV. Respect and Obligations The TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE Information Technology Resources Policy is intended to provide a framework for users to practice respectful use of Information Technology Resources. Failure to act responsibly can adversely affect the work of other users. The policy is intended to prevent abuse of equipment and services and to ensure that usage honors the public trust and supports the Technology college's mission. V. Who May Obtain Accounts A. No person is to be granted access to Technology College Information Technology Resources without agreeing to abide by the provisions of this policy. B. The following persons may obtain an account at TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE: 1. Any current faculty, retired faculty, staff, retired staff, student, or alumnus of TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE. 2. Other persons may qualify for public service accounts on a particular system at the discretion of the IT Manager for Information Technology. VI. System Sponsors and Applicable Policy A. The Information Technology Resources at TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE serve a diverse population. System Sponsors are given discretion to establish reasonable and appropriate policies applicable to the systems they oversee. (For example, on some campus systems, playing of computer games or use of chat programs may be permitted or even encouraged. On other systems, game-playing and chatting may be discouraged or even prohibited.) B. System Sponsors, and by their delegation System Managers and Facility Staff, have discretion to set and revise reasonable usage priorities and operational policies (such as hours of operation, usage time limits, populations to be served, etc.). They may also take such routine steps (e.g., troubleshooting, updating systems, backing up systems, etc.) as may be reasonably necessary for the operation of their systems or facilities. C. In cases of conflict among Users of Information Technology Resources, resolution will follow the TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE Infrastructure Administrative Hierrachy Chart: VII. Cyber-Citizenship A. Responsibility
B. Privacy and Privilege
C. System Integrity
D. Knowledge of External Network Policy
E. Resource Management
VIII. Examples of What Users Are Encouraged to do with TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE Information Technology Resources (Not an Exclusive List): A. Use Information Technology Resources as tools for obtaining and promulgating knowledge. B. Use Information Technology Resources for research and information gathering in support of advisory, analysis, and professional development activities related to the User's Technology college duties. C. Use Information Technology Resources as an aid to the development of surveys and targeted demographic research. D. Use Information Technology Resources to communicate with other Technology college agencies and research partners of Technology college agencies providing document delivery or transferring working documents/drafts for comment. E. Use Information Technology Resources to communicate and exchange information relating directly to the mission and work tasks of the Technology college including email in direct support of work-related functions or collaborative projects. F. Use Information Technology Resources as tools for the preparation of course materials. G. Use Information Technology Resources to enhance educational approaches and teaching methods. H. Use Information Technology Resources to enhance coursework submissions. I. Use Information Technology Resources to increase multi-cultural awareness and to develop practices of observation and reading through exposure and exploration of scientific knowledge, cultural heritage, and the changing contemporary world. J. Use Information Technology Resources for professional development or to maintain job knowledge or skills. K. Use Information Technology Resources for administering grants or contracts for Technology college research programs or work-related applications. L. Use Information Technology Resources to announce Technology college regulations, procedures, policies, services, or activities. IX. Examples of What Users Are Not Permitted to do with TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE Information Technology Resources (Not an Exclusive List): A. Violate Laws. For example: 1. Use Information Technology Resources in a manner that violates TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE policy and/or other applicable policy and laws. Note: a. Users will comply with State and Federal regulations concerning obscenity and the distribution, collection or practice of child pornography; State prohibitions of gambling and restrictions on gaming; and the Federal regulations prohibiting chain letters. b. Faculty Users will comply with the current Ethics Guidelines for Faculty set forth in the TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE Faculty Handbook. c. Student Users must abide by the current TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE Student Handbook Resources and Rules. 2. Transfer or use copyrighted materials without the explicit consent of the owner. a. The unauthorized downloading, copying, or distribution of materials (i.e. proprietary music, video, software, or database information) via Information Technology Resources is prohibited. b. Student Users should be aware that course instructors have primary responsibility for the maintenance of academic integrity. Cases involving academic dishonesty (i.e. plagiarism, cheating, etc. and/or facilitating such an act) should be reported to the dean of the college concerned. B. Commit Offenses Against Others. For example: 1. Harass another using Information Technology Resources. 2. Impersonate another. 3. Take or alter another's work without permission. 4. Assume credit for the work of another. 5. Interfere in another's legitimate use of Information Technology Resources. 6. Display obscene material in a public area. (Note: Any direct attachment, linkage, or anchoring of such materials to documents viewable by the public is prohibited). C. Abuse Information Technology Resources. For example: 1. Attempt to gain another User's password or to log on as another User. 2. Permit unsupervised use of an assigned account by any other person. 3. Use Information Technology Resources for commercial purposes, except as authorized by appropriate Technology college administrative officials. a. Use TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE web pages for commercial, private or personal for-profit activities such as the use of web pages for advertising services for private purposes such as marketing or business transactions, private advertising of products or services, and any activity meant to foster personal gain. b. Use commercial logos / icons unless that vendor provides a Technology college service, such as dining services. Those pages must contain a notice that the vendor provides the service under contract to the Technology college. 4. Use Information Technology Resources in support of agencies or groups outside the Technology college when such use is not in compliance with the mission of the Technology college. a. Use TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE web pages for unauthorized not-for-profit business activities. This includes the conducting of any non-Technology college related fundraising or public relations activities, such as solicitation for religious or political causes. 5. Use Information Technology Resources for activities unrelated to the mission of the Technology college when such use prevents or seriously restricts resource usage by persons fulfilling the mission. 6. Use Information Technology Resources to give access to persons who have not and/or could not obtain access to Technology college resources through official TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE channels. 7. Use any access not specifically assigned to the User and not provided for training or public use. 8. Deliberately alter the account structure assigned to the User so as to increase system permissions. 9. Attempt to render the system or equipment inoperative. 10. Participate in activities that have the intent of tying up Information Technology Resources. 11. Physically abuse Information Technology Resources. 12. Install wireless network transmitters. I. Copyright Provisions A. Default Access 1. The default access to Information Technology Resources (such as files) is to be set to allow the owner read, write, delete, and execute access and to give access to no other person. If the owner of such resources modifies this access to grant others access, such access by another, in itself, is not considered an ethical infraction. B. Software 1. TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE utilizes a wide variety of software, with an equally wide range of license and copyright provisions. Users are responsible for informing themselves of, and complying with, the license and copyright provisions of the software that they use. 2. No software copy is to be made by any User without a prior, good faith determination that such copying is in fact permissible. All Users must respect the legal protection provided by copyright and license to programs and data. C. Content Issues 1. With regard to intellectual property, TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE reserves the right to protect copyrights, patents, trademarks, trade secrets, and other rights obtained legally that prohibit copying, trading, displaying, or using without permission. Many of these items may be found by searching networks including the Internet, but their presence does not imply that they are free to use without permission. 2. All content must comply with copyright laws, policies and regulations detailed in the Federal Copyright Law (Title17 of the United States Code), and Digital Millennium Copyright Act (DMCA), the Technology, Education and Copyright Harmonization (TEACH) Act, and the Ethics Guidelines for Faculty in the TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE Faculty Handbook and the current TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE Student Handbook Resources and Rules. 3. Logos a. The use of the TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE logo is acceptable on Technology College hosted web pages. XI. Rights A. Rights to Access 1. Access to TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE Information Technology Resources is granted contingent on that access not being misused. If that access is misused it can be withdrawn at any time. Further action may be taken as a result of serious offenses. B. Rights to privacy 1. Privacy of Information is the subject of a separate TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE policy that gives considerable guidance on privacy. Other laws, policies and regulations from TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE, the TBR, the State of Tennessee, and the federal government address privacy issues also. 2. While TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE recognizes the role of privacy in an institution of higher learning and every attempt will be made to honor that ideal, there should be no expectation of privacy in any message, file, image or data created, stored, sent, retrieved or received by use of TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE Information Technology Resources. TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE recognizes the principles of academic freedom and free expression. In consideration of these principles, TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE will not monitor or review the content of electronic communications or files of its Users in most instances. TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE expects all Users to obey all applicable policies and laws in the use of Information Technology Resources. 3. Pursuant to the Tennessee Code Annotated, Title 10, Chapter 7, and subject to the exemptions contained therein, electronic files (including email correspondence) which are maintained using TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE resources may be subject to public inspection upon request by a citizen of the State of Tennessee. 4. The Technology college abides by the Family Educational Rights and Privacy Act, or FERPA, which requires the Technology college to protect the confidentiality of student educational records. 5. When sources outside the Technology college request an inspection and/or examination of any Technology college owned or operated Information Technology Resource, and/or files or information contained therein, the Technology college will treat information as confidential unless any one or more of the following conditions exist: a. When approved by the appropriate Technology college official(s) or the head of the department to which the request is directed b. When authorized by the owner(s) of the information c. When required by Federal, State, or local law d. When required by a valid subpoena or court order Note: When notice is required by law, court order, or subpoena, computer users will receive notice of such disclosures (viewing information in the course of normal system maintenance does not constitute disclosure). 6. Data on Technology college computing systems may be copied to backup media periodically. The Technology college makes reasonable efforts to maintain confidentiality, but if Users wish to ensure confidentiality, they are advised to encrypt their data. Although Users may use encryption software, they are responsible for remembering their encryption keys; once data is encrypted, the Technology college will be unable to help recover it should the key used to encrypt the data be forgotten or lost. Additionally, any User of the Technology college's email resources who makes use of an encryption device to restrict or inhibit access to his or her email must provide access to such encrypted communications when requested to do so via appropriate Technology college authority. 7. In general, the contents of a User's files are considered private except when the owner has set the file permissions to grant others access to it and then it is with the restrictions noted above in Section IX. a. The System Sponsor in charge of a system may instruct personnel to investigate the system suspected of being used by someone other than its rightful owner. b. The System Sponsor in charge of a system may instruct personnel to investigate the system suspected of being used in a manner that violates TBR or Technology college policy or federal, state, or local law. c. The content of User files is not to be surreptitiously or otherwise examined, nor is the User generated message content of User network transactions to be monitored without the prior written permission of either the User involved or the appropriate System Sponsor. However, System Managers and others charged by them with forwarding misdirected or undeliverable email and/or delivering printouts and plots may examine such email, files, or hardcopy to the extent reasonably necessary for such purpose. d. Information traversing the data networks may be intercepted and/or analyzed in conjunction with investigations. XII. In Cases of Violation of the TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE Information Technology Resources Policy, the Following Actions are Prescribed: A. Immediate suspension of any or all of the following: the User's account, network access, and Internet access; followed by timely review of the charges by the appropriate person or persons. B. The User's computing privileges at TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE may be permanently and totally removed. There will be no refund of any technology access fees. C. Use of the regular disciplinary processes and procedures of the Technology college for students, staff, administrators, and faculty D. Students may be recommended for suspension or dismissal from TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE. Employees may be recommended for termination from TENNESSEE COLLEGE OF APPLIED TECHNOLOGY - SHELBYVILLE employment. E. Referral to appropriate law enforcement agencies in the case of suspected law violations for criminal and/or civil action. XIII. Related Acceptable Use Policies: a. Tennessee Board of Regents Information Technology Resources Policy More information on the Information Technology Department.
|
|