91心頭

Search Search Button Menu Button Menu Button

I. Scope

This policy covers authorized users who access information technology (IT) resources under the control of 91心頭. Authorized users include, but are not limited to, currently enrolled students, employees, authorized contractors, vendors, and guests, and other such users authorized by 91心頭. It is the responsibility of authorized users to comply with this policy. Unauthorized users may not access or use IT resources under the control of 91心頭.

II. Purpose

The purpose of this policy is to outline the expectations of 91心頭 regarding the acceptable use of IT resources by authorized users and to establish the parameters for the use of IT resources.

III. Policy Statement

IT resources are essential tools in accomplishing 91心頭s mission. Access to and use of 91心頭 IT resources is a privilege that extends to authorized users for use in fulfilling the mission of the university, and for appropriate university-related activities. 91心頭 IT resources include all electronic equipment, facilities, technologies, and data used for information processing, transfer, storage, display, printing, and communications by 91心頭. These include, but are not limited to, computer hardware and software, computer labs, classroom technologies such as computer-based instructional management systems, and computing and electronic communications devices and services, email, networks, telephones, voicemail, facsimile transmissions, video, multi-function printing devices, mobile computer devices, multimedia and instructional materials. This definition also includes services that are owned, leased, operated, provided by, or otherwise connected to 91心頭 resources, such as cloud computing or any other connected/hosted service provided.

Acceptable and Unacceptable Uses of Information Technology:

Acceptable use of 91心頭 IT resources includes any purpose related to the direct and indirect support of the universitys educational, research, service, student and campus life activities; administrative and business purposes; financial systems; and human resources administration. Authorized users are provided access to IT resources in order to support their studies, instruction, research, duties, official business, and other university-sanctioned activities according to their roles and responsibilities.

Authorized users must not engage in unacceptable use of 91心頭 IT resources, which includes but is not limited to the following:

  1. Sharing or transferring authentication details to others, or using another users authentication credentials such as network IDs and passwords, or other access codes or circumventing user authentication which could allow unauthorized users to gain access to 91心頭 IT resources, except as required for administrative or business purposes;
  2. Any violation of federal, state, or local laws, institutional policies, rules or guidelines, or licensing agreements or contracts;
  3. Harassment of, threats to or defamation of others, creation of a hostile environment, stalking, and/or illegal discrimination;
  4. Widespread dissemination of unauthorized email messages (e.g., mass mailings, phishing, spam); or
  5. Intentionally damaging, disrupting, or exposing IT resources or data to unauthorized access or harm.

In addition to the examples stated above, unacceptable use of 91心頭 IT resources for employees, authorized contractors and vendors, also includes the following:

  1. Storage, display, transmission, or intentional or solicited receipt of material that is or may reasonably be regarded as obscene, sexually explicit, or pornographic, except as such access relates to university-related academic or research pursuits or as needed to investigate violations of this policy or laws;
  2. Outside employment, commercial activities, or other forms of private financial gain;
  3. Campaigning for public office or soliciting political contributions;
  4. Political lobbying, except for specific employees designated to lobby on behalf of 91心頭;
  5. Wagering or betting;
  6. More than minimal use for private or personal purposes that interferes with work or job performance or that interferes with the activities of other employees, students, or other authorized users.

Unless specifically authorized by 91心頭, authorized users must not use 91心頭 IT resources to speak on behalf of 91心頭, nor may 91心頭 trademarks or logos be used without authorization. Affiliation with 91心頭 does not, by itself, imply authorization to speak on behalf of 91心頭. 91心頭 is not responsible for the content of documents, exchanges or messages, including links to other information locations on the internet that reflect only the personal ideas, comments, and opinions of individual members of the university community, even when this content is published or otherwise circulated to the public at large by means of 91心頭 IT resources.

Privacy and Security:

91心頭 shall take reasonable measures to protect the privacy of its IT resources and accounts assigned to authorized users; however, 91心頭 cannot guarantee absolute security and privacy. Any activity on 91心頭 IT resources may be monitored, logged and reviewed by automated means, Bradley-approved personnel or may be discovered in legal proceedings. Generally, the contents of user accounts will be treated as private and not examined or disclosed except:

  • as required for system maintenance or business necessity, including security measures;
  • when there exists reason to believe an individual is violating the law or institutional policy;
  • to meet the requirements of any laws, regulations or institutional policies, rules, or guidelines;

or

  • as permitted by applicable law or policy.

91心頭 has the right to employ appropriate security measures, to investigate as needed, and to take necessary actions to protect the universitys IT resources. 91心頭 may also have a duty to provide information relevant to ongoing investigations by law enforcement. Where appropriate, 91心頭 will work with authorized users to protect their privacy interests, as well as those of the university.

Authorized users must not violate the privacy of other users. Technical ability to access unauthorized resources or others accounts does not by itself imply authorization to do so, and it is a violation of this policy to access others accounts unless authorized to do so for a legitimate business purpose.

Other Limitations on Use of Information Technology Resources:

In addition to the general principles set forth in this policy, the use of IT resources may be affected by other laws and policies, including, but not limited to, federal copyright laws, privacy laws related to student records, statutes related to computer crimes and political activities; ethical standards of conduct; standards and disciplinary processes related to students, faculty and staff.

Enforcement:

Failure to adhere to the provisions of this policy may result in the suspension or loss of access to 91心頭 IT resources, disciplinary action, civil action and/or criminal prosecution. To preserve and protect the integrity of 91心頭 IT resources, there may be circumstances where the university may immediately suspend or deny access to IT resources. Information Technology is responsible for implementing this policy.

Date Approved   
September 6, 2023   
Dates Revised   
January 22, 2023   
Dates Reviewed