/ Computing and Information Technology

Technology Usage Policy

技术使用政策的目的是告知和教育我们所有的希望学院共享使用学院技术资源的权利和责任,鼓励透明度和共识。世界杯荷兰vs厄瓜多尔走地

Introduction

Hope College is committed to providing integrated and comprehensive technologies to enhance teaching and learning and to improve productivity and support a residential student community. Hope provides students, faculty and staff with access to a wide range of computing resources, digital information and communication networks to support the academic, research and administrative functions of the College.

This policy strives to provide a balanced approach between user rights and responsibilities with appropriate use of College Technology Resources. Students, faculty, staff, and anyone else authorized (see the “Authorized Users” provision below) to use College Technology Resources are responsible for reading, understanding and complying with this Technology Usage Policy.

College Technology Resources

For purposes of this Policy, College Technology Resources include, but are not limited to, College-owned transmission lines, networks, wireless networks, servers, exchanges, internet connections, terminals, applications, equipment and devices. College Technology Resources include those owned by the College and those used by the College under license or contract, including but not limited to information recorded on all types of electronic media, computer hardware and software, paper or other documentation generated using College Technology Resources, computer networks, and telephone systems.

All technology equipment issued by Hope College remains the property of the College at all times. The College retains the right to access all files stored on College Technology Resources as provided in the “Privacy and Security” provision below. Similarly, the College may access all messages created, sent, received or stored within College email accounts, regardless of their origin, as provided in the “Privacy and Security” provision below.

All users are strongly encouraged to use non-College accounts and personally-owned devices to store, access, and manipulate any and all materials not directly associated with College work or interactions. Incidental personal use of College Technology Resources is permitted.

Authorized Users

Those who access resources whether on campus or external to campus should do so responsibly and in a way that constitutes respectful behavior as defined in theVirtues of Public Discourseand theEqual Opportunity, Harassment, and Non-Discrimination Policy.

世界杯荷兰vs厄瓜多尔走地希望学院员工和学生都能获得学院科技资源。

Hope College graduates may have access to College Technology Resources to aid in their transition after leaving the College. The College reserves the right to limit the amount of access and type of service provided.

Faculty Emeriti and retired staff may have limited access to College Technology Resources at the sole discretion of the College.

Campus visitors, volunteers and guests directly associated with official college activities may have limited access to College Technology Resources at the sole discretion of the College.

An employee or a student who is no longer employed or enrolled at the College, or their designate, may, in the College’s sole discretion, be permitted access to personal or scholarly work stored on College-owned equipment or College-issued accounts.

An employee who has been terminated from the College or student who has been dismissed from the College may, in the College’s sole discretion, have access to College-owned equipment or College-issued accounts according to the “Privacy and Security” section below.

Use of the College Technology Resources

The College operates on a trust basis, assuming that the community uses College Technology Resources acceptably and with integrity. Acceptable uses of College Technology Resources include those which (i) enhance teaching, learning, research, scholarship, creative activity, and service, (ii) enhance co-curricular activities and residential life, (iii) support internal and external communication and collaboration in concert with the College’s mission, and (iv) promote productivity and the official work of students, faculty, staff, offices, departments, recognized student and campus organizations and agencies of the College, and professional and scholarly associations.

Acceptable uses of College Technology Resources comply with theExpense and Resource Stewardship Policyand theCollege’s Social Media Guidelines. All usage and communication by College employees and students must comply withemployeeandstudenthandbooks.

学院努力保护用户的隐私,并支持使用技术自由表达思想。As an academic community, the students, faculty, and staff of the College must respect the privacy of data, respect the rights of others, honorInvention and Patentpolicies, and adhere to the College’sCopyright and Intellectual Propertypolicy, remembering that the same provisions of copyright ownership and fair use that apply in the print environment apply to digital resources including the use of computer software, library online databases and data files such as text, audio, graphics, video, etc.

Prohibited uses include, but are not limited to, uses that:

Infringe On the Rights of Other Users

  • 未经授权访问非公开(机密)信息和电子邮件、语音邮件或其他通信,包括共享或透露个人或组织的授权和密码。
  • Use of College Technology Resources to impersonate another individual or entity.
  • Harassing communication; any communication sent to individuals that is abusive, threatening, or discriminatory toward the recipient or others, or that otherwise violates the College’s Equal Opportunity, Harassment, and Non-Discrimination Policy or behavior policies in Employee and Student Handbooks.

Are Harmful to the System

  • 通过破坏或降低计算机、网络、网站或电子邮件系统的性能,或消耗不公平的系统资源,干扰计算系统和软件的正常运行。
  • Damaging any system by knowingly introducing computer viruses, worms, or spyware.
  • Unauthorized attempts to alter data files or systems.
  • Any action compromising or attempting to compromise the integrity or security of computer systems or networks, whether internal or external to campus

Are Inappropriate or Illegal

  • Unauthorized reproduction of copyrighted materials; infringement of trademark or patent law.
  • Actions that violate software license agreements.
  • 使用学院电子邮件、网页及其他学院科技资源作与学院直接业务无关或与之竞争的商业及/或个人利益之用。
  • Contractual obligations that violate the Expense and Resource Stewardship Policy.
  • Actions that violate the College’s Social Media Guidelines.
  • Implying in any way that the College is participating in political campaigns, campaign fundraising, or other political activity that is inconsistent with its 501(c)(3) status.
  • Use of technology to intentionally access, create, store or transmit pornographic or violence-oriented or harassment-oriented materials or websites unless for legitimate academic purposes.
  • 违反州或联邦法律或学院政策的行为。

Hope College Email

Hope maintains electronic mail and provides College issued e-mail addresses to facilitate College business. Communications via e-mail are subject to all of the College standards and policies that govern other forms of communication.

The College expects e-mail messages to be treated as confidential by other employees and accessed only by the intended recipient or in accordance with the “Privacy and Security” provision below. Employees should not attempt to gain access to another employee's messages without permission.

All messages composed using, sent from, or received on the College’s electronic mail system should be considered official College correspondence and may be accessed by the College pursuant to the Privacy and Security section below. The College will not view, access or otherwise utilize non-Hope email accounts.

To help secure your email and personal accounts, please consider the following:

  • 一旦你发送了一封电子邮件,你就再也不能控制收件人怎么处理它了。一封电子邮件有两个所有者:发件人和收件人。
  • To provide the greatest security, do not forward your personal or non-Hope email accounts to your Hope email account.
  • To provide the greatest security, do not sync your personal or non-Hope accounts with your Hope account.

Privacy and Security

The College respects the privacy of users. However, the College retains the right to access College-issued technology equipment or other College Technology Resources and their contents for purposes that are related to maintenance, the continued operation of the institution, or to investigate potential issues of misuse (including but not limited to potential violations of College policy or law). Otherwise, the College does not monitor or examine user communications, activities and information.

External law enforcement agencies may request access to files through valid subpoenas or other applicable legal processes. Internal access to College Technology Resource records/usage, outside of maintenance and actions to ensure the continued operation of the institution, may only be authorized by the Director of Computing and Information Technology in conjunction with an Administrator charged with investigatory authority for a college policy/investigation process. For employees, only the Director of Human Resources may authorize this process. For students, this would include administrators responsible for student safety and conduct, according to their roles. Procedures pursuant to such matters will follow guidelines established in employee (Exempt Employees;Hourly Full-time Employees;Hourly Part-time Employees;Faculty) andstudent手册和纪律政策。允许CIT在帐户或系统受损的情况下进行紧急访问。当根据本政策访问账户时,学院将尽快通知受影响的用户,但可能出现无法及时通知的情况。

Employees who access College financial, student record or employee databases or other College information systems containing confidential information must access, store, and dispose of that data in a manner that maintains the privacy and security of College information to the greatest extent possible. Such information may also be subject to other privacy or confidentiality laws, including the Family Educational Rights and Privacy Act or laws governing the use and disclosure of health information.

在员工或学生离开的情况下,希望学院保留权利,立即和永久限制任何/所有进一步访问学院拥有的设备,世界杯荷兰vs厄瓜多尔走地学院发行的帐户,或其他学院技术资源,以及依赖于其中之一的服务。

Enforcement of Policy

Reporting: Employees who believe they have witnessed or been a victim of a violation of any of the above policies should notify an immediate supervisor, an appropriate Vice President, the ombudsperson, the Director of Human Resources, or the Director of Computing and Information Technology. Students should notify the Dean of Students, an Associate Dean of Students, Residence Life staff member, or the Director of Computing and Information Technology.

Response: Violation of this policy may result in the immediate and permanent revocation of College technology usage privileges, even those not directly relating to the activity in violation. This applies to all users, including guests. Disciplinary action beyond revocation of technology privileges up to termination or dismissal will be carried out in accordance with existing discipline procedures.

Any issues related to the immediate safety, security, and/or well-being of an individual or group should be immediately reported to Campus Safety at 616-395-7770 or the appropriate local agency via 911.

Read example scenarios that help demonstrate this policy