{"id":11,"date":"2011-12-20T21:05:35","date_gmt":"2011-12-20T21:05:35","guid":{"rendered":"http:\/\/www3.tusculum.edu\/is\/?page_id=11"},"modified":"2018-09-05T09:29:54","modified_gmt":"2018-09-05T13:29:54","slug":"appropriate-use-policy","status":"publish","type":"page","link":"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/","title":{"rendered":"APPROPRIATE USE POLICY"},"content":{"rendered":"<p><strong><u>Acceptable Use Policy<\/u><\/strong><\/p>\n<p><strong>Section 1 &#8211; Network Access <\/strong><\/p>\n<p><strong>Bring your own device (BYOD)<\/strong> is a policy that allows students to bring personally owned mobile devices onto the campus to access privileged TUSCULUM resources such as email, file servers and databases as well as their personal applications and data.<\/p>\n<p>We highly recommend that each student bring a personal computing device to campus with them.\u00a0 Some academic disciplines mandate the student having a computer or device.\u00a0 Notably:<\/p>\n<p>In order to maintain full compliance with the TUSCULUM Network Policy, the TUSCULUM IS Department utilizes a Network Access Control Appliance (NAC). The NAC requires each user to register each device and bring that device into compliance before being granted network access.<\/p>\n<p><strong>What Types of Devices Can I Bring to TUSCULUM?<\/strong><\/p>\n<p>Most devices can access the TUSCULUM student network without any difficulty.\u00a0 A quick (incomplete) list of devices that we&#8217;ve successfully connected to the network includes:<\/p>\n<ul>\n<li>Apple iPhones and iPads with IOS 9 or newer<\/li>\n<li>Android Devices with Version 2.2 or newer<\/li>\n<li>XBox 360 and XBox One<\/li>\n<li>PS3 and PS4<\/li>\n<li>Roku Streaming Boxes<\/li>\n<li>SMART TVs from several different manufacturers<\/li>\n<li>Windows based laptop computers<\/li>\n<li>MacOS based laptop computers<\/li>\n<\/ul>\n<p><strong>What Types of Devices Can&#8217;t I Bring to TUSCULUM?<\/strong><\/p>\n<ul>\n<li>Wireless Printers<\/li>\n<li>Personal Wireless Routers or Wireless Access Points<\/li>\n<li>Chromecast Streaming Devices<\/li>\n<li>Amazon Echo or similar devices<\/li>\n<\/ul>\n<p><strong>That&#8217;s All Good &#8211; What If It Breaks?<\/strong><\/p>\n<p>Each student will be responsible for the maintenance and upkeep of his or her own device. The IS department will assist students with connectivity issues, and can make recommendations about hardware or software issues students may experience.\u00a0<strong> The TUSCULUM IS department cannot work on personally owned devices.<\/strong><\/p>\n<p><strong>Software Requirements<\/strong><\/p>\n<p>Listed below are the basic requirements for the software you&#8217;ll need on your computer while you are a student at TUSCULUM.\u00a0 Individual academic schools and majors may have other requirements that augment or supersede this list.<\/p>\n<ul>\n<li>Microsoft Office 2013 or newer (Word, Excel, PowerPoint) There is a version of Office 365 available with your student email account.<\/li>\n<li>Microsoft Office for Mac 2011 or newer (Word, Excel, PowerPoint)<\/li>\n<li>Adobe Reader<\/li>\n<li>Antivirus Software with a current update subscription<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h1>Our Hours:<\/h1>\n<p>The Tusculum University help desk is located on the 4<sup>th<\/sup> floor of Niswonger Commons building.<\/p>\n<p><strong>Phone\/Walk-in Support Hours:<\/strong> Monday &#8211; Friday &#8211; 8:00 AM to 4:30 PM <strong>Phone\/Web-Based Extended Hours:<\/strong> Monday &#8211; Friday &#8211; 4:30 PM to 9:00 PM <strong>Phone\/Web-Based Weekend Hours:<\/strong> Saturday &#8211; 8:00 AM to 9:30 PM, Sunday &#8211; 12:30 PM to 9:30 PM<\/p>\n<p>The Help Desk strives to respond to each inquiry and each in-person visit in a timely manner. We may ask for additional information about each caller and each problem so that calls can be logged and problems tracked to resolution. It is our goal to resolve the issue during the initial call. If this is not feasible, we strive to resolve the issue within a reasonable timeframe. Since the Help Desk strives to respond to all its customers, the time spent on each individual contact is necessarily limited. Certain problems may need to be researched or escalated to the next level of support in order to be resolved. The Help Desk will assign such problems to the appropriate group or individual. All calls are put into a service queue based on the priority determined. Emergency after hour calls (System Down) will be escalated to our staff so that we can address the emergency as quickly as possible. The Help Desk issues computers with a standard set of university approved software applications. Any software\/hardware\/technology not installed or configured by IS may be outside of this scope and of the Help Desk support parameters. Please note that this does not necessarily mean other software, hardware, and technology is &#8220;banned&#8221; or &#8220;not recommended&#8221;. This simply signifies that the Help Desk cannot provide assistance with every technology.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Section 2 \u2013 Acceptable Use<\/strong><\/p>\n<p>Information technology (\u201cIT\u201d), encompasses a vast and growing array of computing and electronic communications facilities and services. These facilities and services provide the means for Tusculum University students, faculty and staff to meet their daily requirements in meeting the overall mission of the University.<\/p>\n<p>Users of these IT resources have a responsibility not to abuse those resources and to respect the rights of the members of the community as well as the University itself.<\/p>\n<p>This IT Appropriate Use Policy (the \u201cPolicy\u201d or \u201cAUP\u201d) provides guidelines for the appropriate use of Tusculum University IT resources as well as for the University\u2019s access to information about and oversight of these resources.<\/p>\n<p>Most information technology usage parallels familiar activity in other media and formats, making existing University policies important in determining what use is appropriate.<\/p>\n<p>Using electronic mail (\u201cemail\u201d) instead of standard written correspondence, for example, does not fundamentally alter the nature of the communication, nor does it alter the guiding policies.<\/p>\n<p>University policies that already govern freedom of expression and related matters in the context of standard written expression govern electronic expression as well. This Policy addresses circumstances that are particular to the IT arena and is intended to augment but not to supersede other relevant University policies.<\/p>\n<ol>\n<li><strong>Definitions<\/strong>\u2013 The following definitions apply to the Tusculum University Appropriate Use Policy:\n<ol>\n<li><strong>IT Systems<\/strong> \u2013 These are the computers, terminals, phones, switches\/hubs, printers, networks, modem banks, online and offline storage media and related equipment, software, and data files that are owned, managed, or maintained by students, faculty and staff of Tusculum University. For example, IT Systems include institutional and departmental information systems, faculty research systems, desktop computers, the University\u2019s campus network (wired and wireless), and University general access computer clusters.<\/li>\n<li><strong>Users<\/strong> \u2013 A \u201cUser\u201d is any person, whether authorized or not, who makes any use of any Tusculum University IT System from any location.<\/li>\n<li><strong>Systems Authority<\/strong> \u2013 While Tusculum University is the legal owner or operator of all IT Systems, it sometimes delegates oversight of particular systems to other departments or to a specific individual. That department or individual would then be responsible and would have \u201cSystems Authority\u201d for that particular system.<\/li>\n<li><strong>Systems Administrator<\/strong> \u2013 Systems Authorities may designate another person as \u201cSystems Administrator\u201d to manage the particular system assigned to him or her. Systems Administrators oversee the day-to-day operation of the system and are authorized to determine who is permitted access to particular IT resources.<\/li>\n<li><strong>Certifying Authority<\/strong> \u2013 This is the Systems Administrator or other university authority who certifies the appropriateness of an official university document for electronic publication in the course of University business.<\/li>\n<li><strong>Specific Authorization<\/strong> \u2013 This means documented permission provided by the applicable systems administrator.<\/li>\n<\/ol>\n<\/li>\n<li><strong>Purpose<\/strong>\u2013 The purpose of this policy is to ensure an information technology infrastructure that promotes the basic mission of the university in teaching, learning, research, and administration. In particular, this policy aims to promote the following goals:\n<ol>\n<li>To ensure the integrity, reliability, availability, and superior performance of IT Systems;<\/li>\n<li>To ensure that use of IT systems is consistent with the principles and values that govern use of other university facilities and services;<\/li>\n<li>To ensure that IT Systems are used for their intended purposes; and<\/li>\n<li>To establish processes for addressing policy violations and sanctions for violators.<\/li>\n<\/ol>\n<\/li>\n<li><strong>Scope<\/strong> \u2013 This Policy applies to all users of IT systems, including but not limited to university students, faculty, and staff. It applies to the use of all IT systems. These include systems, networks, computers and facilities administered by the Tusculum University Department of Information Systems (TUDIS), as well as those administered by individual schools, departments, university laboratories, and other university-based entities. Use of IT systems, even when carried out on a privately owned computer that is not managed or maintained by Tusculum University, is governed by this policy.<\/li>\n<li><strong>Use of IT Systems<\/strong>\u2013 Although this policy sets forth the general parameters of appropriate use of IT Systems, faculty, students, and staff should consult their respective governing policy manuals for more detailed statements on permitted use and the extent of use that the university considers appropriate in light of their varying roles within the community. In the event of conflict between IT policies, this Appropriate Use Policy will prevail.\n<ol>\n<li>Appropriate Use \u2013 IT Systems may be used only for their authorized purposes \u2014 that is, to support the research, education, clinical, administrative, and other functions of Tusculum University. The particular purposes of any IT system as well as the nature and scope of authorized, incidental personal use may vary according to the duties and responsibilities of the User.<\/li>\n<li>Proper Authorization \u2013 Users are entitled to access only those elements of IT Systems that are consistent with their authorization.<\/li>\n<li>Specific Proscriptions on Use \u2013 The following categories of use are inappropriate and prohibited:\n<ol>\n<li>Use that impedes, interferes with, impairs, or otherwise causes harm to the activities of others. Users must not deny or interfere with or attempt to deny or interfere with service to other users in any way, including by \u201cresource hogging,\u201d misusing mailing lists, propagating \u201cchain letters\u201d or virus hoaxes, \u201cspamming\u201d (spreading email or postings widely and without good purpose), or \u201cbombing\u201d (flooding an individual, group, or system with numerous or large email messages). Knowing or reckless distribution of unwanted mail or other unwanted messages is prohibited. Other behavior that may cause excessive network traffic or computing load is also prohibited.<\/li>\n<li>Use that is inconsistent with Tusculum University\u2019s non-profit status. The University is a non-profit, tax-exempt organization and, as such, is subject to specific federal, state, and local laws regarding sources of income, political activities, use of property, and similar matters. As a result, commercial use of IT systems for non-university purposes is generally prohibited, except if specifically authorized and permitted under University conflict-of-interest, outside employment, and other related policies. Prohibited commercial use does not include communications and exchange of data that furthers the university\u2019s educational, administrative, research, clinical, and other roles, regardless of whether it has an incidental financial or other benefit to an external organization. Use of IT systems in a way that suggests university endorsement of any political candidate or ballot initiative is also prohibited. Users must refrain from using IT systems for the purpose of lobbying that connotes university involvement, except for authorized lobbying through or in consultation with the University\u2019s Administrative Offices.<\/li>\n<li>Harassing or threatening use. This category includes, for example, display of offensive, sexual material in the workplace and repeated unwelcome contacts with another.<\/li>\n<li>Use damaging the integrity of university or other IT Systems. This category includes, but is not limited to, the following six activities:\n<ol>\n<li>Attempts to defeat system security. Users must not defeat or attempt to defeat any IT system\u2019s security \u2014 for example, by \u201ccracking\u201d or guessing and applying the identification or password of another User, or compromising room locks or alarm systems. (This provision does not prohibit, however, TUDIS or Systems Administrators from using security scan programs within the scope of their Systems Authority.)<\/li>\n<li>Unauthorized access or use. Tusculum recognizes the importance of preserving the privacy of users and data stored in IT systems. Users must honor this principle by neither seeking to obtain unauthorized access to IT systems, nor permitting or assisting any others in doing the same. For example, a non-Tusculum organization or individual may not use non-public IT Systems without specific authorization. Privately owned computers may be used to provide public information resources, but such computers may not host sites or services for non-Tusculum organizations or individuals across the university network without specific authorization. Similarly, Users are prohibited from accessing or attempting to access data on IT systems that they are not authorized to access. Furthermore, Users must not make or attempt to make any deliberate, unauthorized changes to data on an IT system. Users must not intercept or attempt to intercept or access data communications not intended for that user.<\/li>\n<li>Disguised use. Users must not conceal their identity when using IT systems, except when the option of anonymous access is explicitly authorized. Users are also prohibited from masquerading as or impersonating others or otherwise using a false identity.<\/li>\n<li>Distributing computer viruses. Users must not knowingly distribute or launch computer viruses, worms, or other rogue programs.<\/li>\n<li>Modification or removal of data or equipment. Without specific authorization, users may not remove or modify any university-owned or administered equipment or data from IT Systems. This includes the loading of \u201cpirated\u201d software.<\/li>\n<li>Use of unauthorized devices. Without specific authorization, Users must not physically or electrically attach any additional device (such as an external disk, printer, or video system) to IT Systems.<\/li>\n<\/ol>\n<\/li>\n<li>Use in violation of law. Illegal use of IT Systems \u2014 that is, use in violation of civil or criminal law at the federal, state, or local levels \u2014 is prohibited. Examples of such uses are: promoting a pyramid scheme; distributing illegal obscenity; receiving, transmitting, or possessing child pornography; infringing copyrights; and making bomb threats. With respect to copyright infringement, Users should be aware that copyright law governs (among other activities) the copying, display, and use of software and other works in digital form (text, sound, images, and other multimedia). The law permits use of copyrighted material without authorization from the copyright holder for some educational purposes (protecting certain classroom practices and \u201cfair use,\u201d for example), but an educational purpose does not automatically mean that the use is permitted without authorization.<\/li>\n<li>Use in violation of University contracts. All use of IT Systems must be consistent with the University\u2019s contractual obligations, including limitations defined in software and other licensing agreements.<\/li>\n<li>Use in violation of University policy. Use in violation of other University policies also violates this AUP. Relevant University policies include, but are not limited to, those regarding sexual harassment and racial and ethnic harassment, as well as University, departmental, and work-unit policies and guidelines regarding incidental personal use of IT Systems.<\/li>\n<li>Use in violation of external data network policies. Users must observe all applicable policies of external data networks when using such networks.<\/li>\n<\/ol>\n<\/li>\n<li>Free Inquiry and Expression \u2013 Users of IT systems may exercise rights of free inquiry and expression consistent with the limits of the law.<\/li>\n<li>Personal Account Responsibility \u2013 Users are responsible for maintaining the security of their own IT Systems accounts and passwords. Any User changes of password must follow published guidelines for passwords. Accounts and passwords are normally assigned to single Users and are not to be shared with any other person without authorization by the applicable Systems Administrator. Users are presumed to be responsible for any activity carried out under their IT Systems accounts or posted on their personal web pages.<\/li>\n<li>Responsibility for Content \u2013 Official University information may be published in a variety of electronic forms. The Certifying Authority under whose auspices the information is published is responsible for the content of the published document. Users also are able to publish information on IT Systems or over Tusculum University\u2019s networks. Neither the University nor individual Systems Administrators can screen such privately published material nor can they ensure its accuracy or assume any responsibility for its content. The University will treat any electronic publication provided on or over IT Systems that lacks a Certifying Authority as the private speech of an individual user.<\/li>\n<li>Personal Identification \u2013 Upon request by a Systems Administrator or other University authority, Users must produce valid University identification.<\/li>\n<\/ol>\n<\/li>\n<li><strong>Computer Resources Code of Ethics<\/strong>\n<ol>\n<li>Ethical and Responsible Use \u2013 All Users of any institutionally maintained electronic data, data files, software, and networks are expected to handle the resource in a responsible and ethical manner. A User\u2019s access to IT resources ceases when it invades the right of personal and\/or institutional privacy; results in the destruction of personal and\/or institutional property; demonstrates a potential for loss, embarrassment, litigation to the individual and\/or institution; or causes a limited resource to be used in a wasteful or careless manner.<\/li>\n<li>Confidentiality \u2013 All information processed through Computer Systems is considered sensitive and\/or confidential. The responsibility for the release or discussion of data is assigned to the official custodian of the data file(s). Access to information is based on a legitimate \u201cneed to know\u201d and directly related to assigned duties.<\/li>\n<li>Examples of Irresponsible Use \u2013 The following examples attempt to convey the intent of irresponsible and\/or unethical use: violation of the Family Educational Rights and Privacy Act of 1974; use of the resource for obscene material; deliberate wasteful use of the resource; unauthorized altering of hardware, software, or data; piracy of data or software belonging to another person; or careless use of the resource which may result in the release of restricted information.<\/li>\n<\/ol>\n<\/li>\n<li><strong>Code for Computer Resource Use<\/strong>\n<ol>\n<li>Ethical and Responsible Use \u2013 Computer resources at Tusculum University are available to authorized students, faculty, staff and off-campus constituents. Access to these resources is obtained from the Systems Administrator and is granted with the understanding that they will be used as stated in the request and in keeping with the idea that one\u2019s interest ceases when it invades the right of personal and\/or institutional privacy, results in the destruction of personal and\/or institutional property, demonstrates a potential for loss, embarrassment, litigation to the individual and\/or institution, or because of an otherwise irresponsible use of a limited resource. It is the policy of the office of information systems to avail these resources to as many users as possible and, to the extent possible, keep the number of restraints and restrictions on the individuals to a minimum with the ability to provide service to all who request use.<\/li>\n<li>Ethical and Responsible Use \u2013 For such a policy to work, it is essential that users observe responsible and ethical behavior in the use of the resources. In an effort to assist the user community in effective use of the limited computer resources, it seems reasonable to highlight some specific responsibilities and type of behavior that represent abuse of a User\u2019s privileges. The examples do not constitute a complete list but are intended to convey the intent of the code.\n<ol>\n<li>Users should not damage or attempt to damage equipment or to modify or attempt to modify equipment so that it does not function as originally intended. It is equally wrong to damage or modify or attempt to damage or modify the software components: operating system, compilers, utility routines, etc<\/li>\n<li>Users should not use or attempt to use an account without authorization from the owner of the account. Users have the responsibility of protecting their accounts through the proper use of passwords, but the fact that an account is unprotected does not imply permission for an unauthorized person to use it. Further, accounts are to be used only for the purposed for which they have been established. Additionally, it is wrong to use a university-sponsored account for funded research, personal business, or consulting activities. There are special accounts for such purposes.<\/li>\n<li>Users should not use private files without authorization. Owners of such files should take precautions and use security mechanisms available. However, the fact that a file is not protected does not make it right for anyone to access it, unless it is specifically designated as a public access file. It is equally wrong for anyone to change or delete a file that belongs to anyone else without authorization. Violation or property rights and copyrights covering data, computer programs, and documentation is also wrong. In the event of accidental access of private files, confidentiality of those files must be maintained.<\/li>\n<li>Any deliberate wasteful use of resources is irresponsible; it encroaches on other\u2019s use of facilities and deprives them of resources. Printing of large unnecessary listing and the playing of games solely for entertainment are examples of such abuse. Users are expected to be aware of the resources they are using and to make reasonable efforts to use these resources efficiently.<\/li>\n<li>Administrators, faculty, staff of the Office of Computer Systems, and others in positions of trust within the Tusculum University community have a professional responsibility to insure that the equipment, software, and services provide the most efficient levels of support and consider the needs of the total user community. Such persons in positions of trust who misuse computing resources or take advantage of their positions to access data not required in the performance of their duties are displaying unprofessional behavior.<\/li>\n<li>All state and federal copyright laws will be abided by at all times. Users must not copy any part of a copyrighted program or its documentation that would be in violation of the law or the licensing agreement without the written and specific permission of the copyright holder.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<li><strong>Conditions of University Access<\/strong>\u2013 The University places a high value on privacy and recognizes its critical importance in an academic setting. There are nonetheless circumstances in which, following carefully prescribed processes, the University may determine that certain broad concerns outweigh the value of a User\u2019s expectation of privacy and warrant University access to relevant IT Systems without the consent of the User. Those circumstances are discussed below, together with the procedural safeguards established to ensure access is gained only when appropriate.\n<ol>\n<li>Conditions \u2013 In accordance with state and federal law, the University may access all aspects of IT Systems, without the consent of the User, in the following circumstances:\n<ol>\n<li>When necessary to identify or diagnose systems or security vulnerabilities and problems, or otherwise preserve the integrity of the IT Systems; or<\/li>\n<li>When required by federal, state, or local law or administrative rules; or<\/li>\n<li>When there are reasonable grounds to believe that a violation of law or a significant breach of University policy may have taken place and access and inspection or monitoring may produce evidence related to the misconduct; or<\/li>\n<li>When such access to IT Systems is required to carry out essential business functions of the University; or<\/li>\n<li>When required to preserve public health and safety<\/li>\n<\/ol>\n<\/li>\n<li>Process \u2013 Consistent with the privacy interests of Users, University access without the consent of the User will occur only with the approval of the VPAA (for faculty users), the Provost\/Vice Presidents (for staff users), the Dean of Students (for student users), except when an emergency entry is necessary to preserve the integrity of facilities or to preserve public health and safety. The University, through the Systems Administrators, will log all instances of access without consent. Systems Administrators will also log any emergency entry within their control for subsequent review by appropriate University authority. A User will be notified of University access to relevant IT Systems without consent, pursuant to Section V. A. (1-5); depending on the circumstances, such notification will occur before, during, or after the access, at the University\u2019s discretion.1.0 NOTICE TO USERS: It is the policy of Tusculum University to protect all institutional computing resources including, but not limited to, hardware and software, consisting of the actual equipment being supplied by the university as well as the programs and related materials used in conjunction therewith. In accordance with local, state, and federal law, indiscriminate examination of individual\u2019s files is not permitted, nonetheless as a means of maintaining the integrity and security of those aforementioned resources.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>Tusculum University retains the right to inspect accounts and files stored on any system owned, maintained and\/or leased by said University. While no prior authorization by individual users is required to inspect those files and accounts, you are, by virtue of accepting the account offered by Tusculum University and \u201clogging\u201d on to its computing equipment, granting to the university prior unrestricted permission, subject to university policy, to review, examine and\/or otherwise view, by any method at the sole discretion of the University and without any additional advance notice to said user, any account and\/or file stored on university computer resources.<\/p>\n<p>Should such a review take place, you will be given notice, as a courtesy only, of the results of said review within a reasonable time after the review is completed. While use of university computing resources for personal use is strictly forbidden, should you have materials for which you have reasonable expectation of privacy or which you consider to be confidential for any reason, you should retain those materials on a disk which can be secured as you would any other personal items or materials which you consider private in nature.<\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li>User access deactivations \u2013 In addition to accessing the IT Systems, the University, through the appropriate Systems Administrator, may deactivate a User\u2019s IT privileges, whether or not the User is suspected of any violation of this policy, when necessary to preserve the integrity of facilities, user services, or data. The Systems Administrator will attempt to notify the User of any such action.<\/li>\n<li>Use of security scanning systems \u2013 By attaching privately owned personal computers or other IT resources to the University\u2019s network, Users consent to University use of scanning programs for security purposes on those resources while attached to the network.<\/li>\n<li>Logs \u2013 Most IT systems routinely log user actions in order to facilitate recovery from system malfunctions and for other management purposes. All Systems Administrators are required to establish and post policies and procedures concerning logging of User actions, including the extent of individually-identifiable data collection, data security, and data retention.<\/li>\n<li>Encrypted material \u2013 Encrypted files, documents, and messages may be accessed by the University under the above guidelines. S ee Section IV F, above<\/li>\n<\/ol>\n<\/li>\n<li><strong>Enforcement Procedures<\/strong>\n<ol>\n<li>Complaints of Alleged Violations \u2013 An individual who believes that he or she has been harmed by an alleged violation of this Policy may file a complaint in accordance with established University Grievance Procedures (including, where relevant, those procedures for filing complaints of sexual harassment or of racial or ethnic harassment) for students, faculty, and staff. The individual is also encouraged to report the alleged violation to the Systems Authority overseeing the facility most directly involved, or to the TUDIS, which must investigate the allegation and (if appropriate) refer the matter to University disciplinary and\/or law enforcement authorities.<\/li>\n<li>Reporting Observed Violations \u2013 If an individual has observed or otherwise is aware of a violation of this Policy, but has not been harmed by the alleged violation, he or she may report any evidence to the Systems Authority overseeing the facility most directly involved, or to the TUDIS, which must investigate the allegation and (if appropriate) refer the matter to University disciplinary and\/or law enforcement authorities.<\/li>\n<li>Disciplinary Procedures \u2013 Alleged violations of this policy will be pursued in accordance with the appropriate disciplinary procedures for faculty, staff, and students, as outlined in the Faculty Handbook, Staff Personnel Policies, various student regulations, and other applicable materials. Staff members who are members of University-recognized bargaining units will be disciplined for violations of this policy in accordance with the relevant disciplinary provisions set forth in the agreements covering their bargaining units.<\/li>\n<li>Penalties \u2013 Individuals found to have violated this policy may be subject to penalties provided for in other University\u2019s policies dealing with the underlying conduct. Violators may also face IT-specific penalties, including temporary or permanent reduction or elimination of some or all IT privileges. The appropriate penalties shall be determined by the applicable disciplinary authority in consultation with the Systems Administrator.<\/li>\n<li>Legal Liability for Unlawful Use \u2013 In addition to University discipline, Users may be subject to criminal prosecution, civil liability, or both for unlawful use of any IT System.<\/li>\n<li>Appeals \u2013 Users found in violation of this policy may appeal or request reconsideration of any imposed disciplinary action in accordance with the appeals provisions of the relevant disciplinary procedures.<\/li>\n<\/ol>\n<\/li>\n<li><strong>Policy Developement<\/strong> \u2013 This Policy may be periodically reviewed and modified by the TUDIS and IT staffs, who may consult with relevant University committees, faculty, students, and staff.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Acceptable Use Policy Section 1 &#8211; Network Access Bring your own device (BYOD) is a policy that allows students to bring personally owned mobile devices onto the campus to access privileged TUSCULUM resources such as email, file servers and databases as well as their personal applications and data. We highly recommend that each student bring [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":324,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-11","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>APPROPRIATE USE POLICY - TUDIS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"APPROPRIATE USE POLICY - TUDIS\" \/>\n<meta property=\"og:description\" content=\"Acceptable Use Policy Section 1 &#8211; Network Access Bring your own device (BYOD) is a policy that allows students to bring personally owned mobile devices onto the campus to access privileged TUSCULUM resources such as email, file servers and databases as well as their personal applications and data. We highly recommend that each student bring [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"TUDIS\" \/>\n<meta property=\"article:modified_time\" content=\"2018-09-05T13:29:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2011\/12\/IMG_9140-aaaa-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"23 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/\",\"url\":\"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/\",\"name\":\"APPROPRIATE USE POLICY - TUDIS\",\"isPartOf\":{\"@id\":\"https:\/\/www3.tusculum.edu\/is\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2011\/12\/IMG_9140-aaaa.jpg\",\"datePublished\":\"2011-12-20T21:05:35+00:00\",\"dateModified\":\"2018-09-05T13:29:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/#primaryimage\",\"url\":\"https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2011\/12\/IMG_9140-aaaa.jpg\",\"contentUrl\":\"https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2011\/12\/IMG_9140-aaaa.jpg\",\"width\":3456,\"height\":2304,\"caption\":\"Student seated in computer lab\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www3.tusculum.edu\/is\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"APPROPRIATE USE POLICY\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www3.tusculum.edu\/is\/#website\",\"url\":\"https:\/\/www3.tusculum.edu\/is\/\",\"name\":\"TUDIS\",\"description\":\"Tusculum University Information Systems\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www3.tusculum.edu\/is\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"APPROPRIATE USE POLICY - TUDIS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/","og_locale":"en_US","og_type":"article","og_title":"APPROPRIATE USE POLICY - TUDIS","og_description":"Acceptable Use Policy Section 1 &#8211; Network Access Bring your own device (BYOD) is a policy that allows students to bring personally owned mobile devices onto the campus to access privileged TUSCULUM resources such as email, file servers and databases as well as their personal applications and data. We highly recommend that each student bring [&hellip;]","og_url":"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/","og_site_name":"TUDIS","article_modified_time":"2018-09-05T13:29:54+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2011\/12\/IMG_9140-aaaa-1024x683.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"23 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/","url":"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/","name":"APPROPRIATE USE POLICY - TUDIS","isPartOf":{"@id":"https:\/\/www3.tusculum.edu\/is\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/#primaryimage"},"image":{"@id":"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2011\/12\/IMG_9140-aaaa.jpg","datePublished":"2011-12-20T21:05:35+00:00","dateModified":"2018-09-05T13:29:54+00:00","breadcrumb":{"@id":"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/#primaryimage","url":"https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2011\/12\/IMG_9140-aaaa.jpg","contentUrl":"https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2011\/12\/IMG_9140-aaaa.jpg","width":3456,"height":2304,"caption":"Student seated in computer lab"},{"@type":"BreadcrumbList","@id":"https:\/\/www3.tusculum.edu\/is\/appropriate-use-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www3.tusculum.edu\/is\/"},{"@type":"ListItem","position":2,"name":"APPROPRIATE USE POLICY"}]},{"@type":"WebSite","@id":"https:\/\/www3.tusculum.edu\/is\/#website","url":"https:\/\/www3.tusculum.edu\/is\/","name":"TUDIS","description":"Tusculum University Information Systems","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www3.tusculum.edu\/is\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www3.tusculum.edu\/is\/wp-json\/wp\/v2\/pages\/11","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www3.tusculum.edu\/is\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www3.tusculum.edu\/is\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www3.tusculum.edu\/is\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www3.tusculum.edu\/is\/wp-json\/wp\/v2\/comments?post=11"}],"version-history":[{"count":7,"href":"https:\/\/www3.tusculum.edu\/is\/wp-json\/wp\/v2\/pages\/11\/revisions"}],"predecessor-version":[{"id":430,"href":"https:\/\/www3.tusculum.edu\/is\/wp-json\/wp\/v2\/pages\/11\/revisions\/430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www3.tusculum.edu\/is\/wp-json\/wp\/v2\/media\/324"}],"wp:attachment":[{"href":"https:\/\/www3.tusculum.edu\/is\/wp-json\/wp\/v2\/media?parent=11"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}