Responsible Use of Information Technology Resources

Guidelines 

This statement defines the guidelines governing access to and use of information technology resources at Ringling College of Art and Design. These guidelines have been implemented to clarify and simplify procedures regarding use of information technology resources and to safeguard the computing and data network equipment. Users should also refer to the Responsible Use of Elec­tronics Communications policy (above) for additional examples of misuse of campus computing and information resources. Feedback as to the effectiveness of these guidelines is encouraged.

All members of the Ringling College community are expected to utilize information technology resources in a responsible and appropriate manner, respecting the rights of other users.

Users are responsible for becoming familiar with their rights and responsibilities and applicable laws and guidelines. By utilizing these services, an individual agrees to abide by the guidelines and procedures that govern its use.

Failure to abide by these guidelines and other appli­cable codes or local, state, or federal laws may result in disciplinary actions including, but not limited to, loss or limitation of privileges in using information technology resources.

Examples of Violations

Misuse of computing and information resources and privileges includes, but is not limited to, the following:

  • Disclosing network account credentials to anyone.
  • Re-broadcasting unsolicited e-mail or USENET news (spam or electronic junk mail).
  • Generating or forwarding chain letters, or participating in any kind of multilevel or pyramid scheme.
  • Storing or transmitting copyrighted materials or licensed materials such as MP3 audio files without the owner’s permission.
  • Introducing viruses or other disruptive/destructive programs.
  • Using resources such as network bandwidth or disk storage excessively.
  • Attempting to evade or bypass resource quotas such as disk usage quota (logon to www.ringling.edu/manage.html to check your resource quotas).
  • Logging into workstations in more than one campus laboratory at the same time.
  • Attempting to decrypt coded information such as passwords.
  • Using any Internet Protocol (IP) address inside or outside the Ringling College domain(s) without prior approval.
  • Attempting to install or utilize a server, network analysis tool, or network management tool on the Ringling College network without authorization.
  • Intercepting network traffic intended for nodes other than one’s own.

Security and Confidentiality of Information Storage and Transmission

Ringling College of Art and Design cannot guarantee the confidentiality or privacy of electronic mail messages and other documents stored on College computers. Ringling College assumes users are aware that electronic files and transmissions are not necessarily secure.

Furthermore, electronic mail in its present form is not secured and has the potential to be vulnerable to unauthorized access, modification, and forgery. Such services should be utilized with this in mind.

World Wide Web users should be aware that it is possible for software on a website to explore and retrieve information from the user’s computer without the user being aware of the invasion. Anyone who “downloads” software, certain applications, or certain file types, or receives email attachments should be aware of the possibility that such material could incorporate viruses, worms, or other destructive materials.

Guidelines Relating to Confidentiality

  • Ringling College reserves the right to conduct routine maintenance, track problems, and maintain the integrity of its systems. As is the case with all data kept on Ringling College’s com­puter systems, the content of electronic mail or user files may be revealed by such activities.
  • Ringling College does not routinely monitor the contents of email. However, such monitoring may be conducted when required to protect the integrity of the systems or to comply with legal obligations
  • Ringling College reserves the right to inspect the contents of email and all disk files in the course of an investigation into alleged impropriety or as necessary, to locate substantive information not readily available by other means, or to ensure compliance with institutional policy
  • Authorization to investigate the contents of user files or emails must be given by the Senior Officers.

Responsibilities of System Administrators

System administrators shall perform their duties fairly, in cooperation with the user community, the appropriate higher-level administrators, and College policies. System administrators shall respect the privacy of users as far as possible and shall refer all disciplinary matters to appropriate authorities.