The College counts on Users to exercise prudence and sound judgment when using its IT Resources. Generally, this means (1) using IT Resources only for their intended purposes, (2) complying with applicable laws and college policies, and (3) protecting IT Resources from damage or harm. The rights of academic freedom and freedom of expression apply to the use of IT resources. The following guidelines provide more details about using IT Resources responsibly:
1. Use IT Resources only for their intended purposes.
The College’s IT Resources are typical of those used in higher education institutions. ITS will inform Users about service contract or software licensing terms that may require Users to use certain IT Resources differently from what is considered usual and customary.
For IT Resources that require specialized knowledge or instructions to use, training will be provided or is available, if requested. In addition, employees and students have unlimited access to LinkedIn Learning, which offers online, self-paced courses for many of the software applications used by the College. If you are unsure how to use a particular IT Resource or have questions about training, please contact ITS.
Many IT Resources require User-specific authentication to use them. Do not intentionally or negligently disclose passwords or other authentication information that could enable others to impersonate you. Do not give someone else your Union College ID badge to use and immediately report a lost or stolen ID badge to Campus Safety.
A reasonable amount of personal use of IT Resources is permitted if your personal use complies with this and other college policies. IT Resources must not be used for running a side business or creating content for or engaging in commercial ventures that are unrelated to academic research and scholarship endeavors. Supervisors have the discretion to set additional guidelines for staff members’ personal use of IT Resources. These guidelines pertaining to personal use of IT Resources do not apply to outside work performed by faculty members as defined in the Outside Work policy in the Faculty Manual.
2. Comply with applicable laws and college policies.
Federal and state laws that apply to using IT Resources include those pertaining to defamation, libel, and slander; copyright and trademark infringement; intellectual property; child pornography and human trafficking; and wiretapping, hacking, cracking, and other similar activities.
Since laws in other countries may apply when using IT Resources outside of the United States, consult with ITS before you travel. ITS can also provide advice for protecting your personal devices and data while traveling abroad.
College policies pertaining to appropriate conduct apply when using IT Resources just as they would in any other circumstance and include those in the Employee Handbook, the Faculty Manual, and the Student Conduct Code, as well as conduct policies that are referenced in these policy documents, most importantly including the Policy Prohibiting Discrimination, Harassment, Bias and Retaliation in Employment. It is your responsibility to understand and comply with college policies when using IT Resources.
3. Protect IT Resources from damage or harm.
Although the College has put in place measures to protect its IT Resources from security threats and other harmful acts, you have an essential role in ensuring these measures work as intended. As noted previously in this policy, never disclose information that may allow unauthorized persons to access IT Resources, such as passwords (to access electronic IT Resources) and ID badges (to access physical IT Resources on campus property).
Although ITS monitors and provides guidance to Users regarding scams or other malicious activity intended to gain unauthorized access to IT Resources, the College is counting on your vigilance. If an email, text or chat message, or other electronic communication appears at all suspicious, do not click on any links or respond. Immediately alert ITS.
Be conscientious about your use of network bandwidth and refrain from activities that could interfere with other Users’ activities. You may consult with ITS if you are unsure about how much bandwidth a particular activity may consume, such as downloads or uploads of unusually large data files.
If you have questions about these User responsibilities, please contact ITS, the Chief Information Officer, or the Appropriate Officer.