Acceptable Use Policy

Purpose

Corning Community College offers an extensive array of information resources to students, faculty, staff, and other members of the College community. While the College's general policies and codes of conduct apply to any and all resources of the College, this Acceptable Use Policy (the “Policy”) further defines the special rights and responsibilities that apply to the use of the College's Information Resources (“Resources”).

The Resources of the College include:

  • All computers, equipment, software, networks, and related facilities; owned, managed, or maintained by the College, for the handling of data, voice, telephone, or related signals or information;
  • The creation, processing, communication, distribution, storage, and disposal of information under the College's authority and span of control;
  • All messages, data, files, programs, Internet web sites, and other material or information stored in or transmitted via the College’s systems.

Resources are made available to support and enhance the academic and administrative goals of the College. All persons authorized for access to these Resources are referred to in this Policy as “Users”.

Users have differing purposes and needs for accessing various Resources. Each User shares in the responsibility to access Resources appropriately and to protect such Resources from unauthorized use.

The College’s Technology Planning and Advisory Committee (TPAC), the Information Technology (IT) department and the Institutional Research (IR) department are responsible for the administration of this Policy.

Organizational Structure

College Resources are governed by a hierarchy of oversight, as follows:

  • Technology Planning and Advisory Committee: charged with providing the ongoing analysis, review, and recommendations to meet the goals, needs, and Resources of the College’s technology planning efforts;
  • Information Technology department (IT): charged with implementing the College’s strategic technology objectives and with ensuring unimpeded access to dependable, secure, and up-to-date networking, information and communications technology;
  • Institutional Research department (IR): charged with being the central repository for the collection, analysis and reporting of official College data;
  • Data custodians: key functional users, charged with the responsibility for the maintenance and control of data pertinent to their areas of expertise;
  • Various academic, student support and administrative services departments: charged with the accurate and timely input and reporting of relevant data.

User Acknowledgement

By logging into a College account, Users agree to abide by and comply with all of the terms and conditions set forth in this Policy. It is a Users responsibility to read this Policy carefully, prior to accessing College Resources. This Policy is legally binding on all Users.

Authorized Use

Resources may be accessed and used only for the purposes authorized by the College. These purposes are generally comprised of work, professional development, study, research, service, or student activities consistent with the College's mission and goals. Authorized use of Resources will comply with:

  • Relevant College policies, such as:
    • Academic Computing Code of Conduct Social Networking Policy
    • Identity Theft Prevention Policy
    • Reporting Fraud, Waste or Abuse Policy
  • State and federal laws and regulations, such as:
    • SUNY Cyber Incident Reporting Policy
    • Family Educational Rights & Privacy Act (FERPA)
    • Health Insurance Portability and Accountability Act of 1996 (HIPAA)
  • Third-party licensing agreements;
  • Intellectual-property rights, including copyrights

The College acknowledges that limited personal use of its Resources is compatible with a higher educational environment, but only where such personal use acts to foster support of the College’s broader goals. Personal use will be incidental, at most, and may not cause the College to incur additional costs. In general, use must be appropriate and in compliance with College policies; not violate the law, licensing agreements or intellectual property rights; and not interfere with any individual’s responsibilities.

Acceptable use standards require the following of each User:

  1. To learn how to use College Resources effectively and responsibly;
  2. To accept responsibility for backup and security of your own work;
  3. To abide by all security provisions;
  4. To understand and respect software copyright laws;
  5. To identify yourself clearly and accurately in electronic communication;
  6. To respect the rights of others to have freedom from harassment or intimidation;
  7. To recognize limitations to privacy in electronic communications.

Unauthorized Use

Examples of unacceptable uses include, but are not limited to, the following:

  1. Obtain Resources beyond their authorization;
  2. Alter or defeat restrictions placed on Resources;
  3. Use Resources in a malicious or harmful manner;
  4. Use Resources to threaten or harass any person or to create a hostile place to work or study;
  5. Degrade performance or deprive other Users of access to Resources;
  6. Install software without the consent of IT;
  7. Create unauthorized access points;
  8. Create unauthorized databases or functionality that is available through College Resources;
  9. Send unauthorized e-mail;
  10. Use another User’s account without permission;
  11. Give or publish a password, identifying code, personal identification number, or other confidential information of another User.
  12. Attempt to subvert security systems or data protection schemes;
  13. Engage in copyright infringement;
  14. Engage in any illegal commerce or any illegal activity of any kind;
  15. Use Resources for personal gain, for the benefit of a third party, or for activities that are inconsistent with the College’s tax-exempt status (such as political campaigning);
  16. Create and/or operate web sites on computers on the College network without obtaining prior approval from IT;
  17. Extend the network by introducing a hub, switch, router, firewall, wireless access point, server, or any other service or device without obtaining prior approval from IT.

Resource Security

User IDs and passwords are the primary method used to authenticate Users prior to access to College Resources. Users may help ensure security of Resources by adhering to the following:

  • Access Resources only from secure environments;
  • Change passwords regularly and never share passwords with others;
  • Report any perceived unauthorized access;
  • Notify IT if passwords have been compromised;
  • Log out of sessions before leaving any Resource unattended;
  • Safeguard Resources from any threats to its accuracy or integrity;
  • Protect Resources from unauthorized disclosures;
  • Cooperate fully during investigations of improper use.

Note: Users may be held responsible for authorized or unauthorized activity conducted under their ID.

No person, including any member of the IT staff, is authorized to request a User’s password. Software and Compliance College Resources will be reviewed annually by IT for unauthorized/unlicensed software and other usage that does not meet compliance with this policy.

E-mail

The College uses both its e-mail system and the United States Postal Service as official means of communications. The College uses these communication methods to conduct and notify students, faculty, and staff of College‐related business (including general information and other items of importance to students, faculty and staff). To ensure the effectiveness of communications via the College’s e-mail system, the following conditions are set forth:

  • The College may direct official communications to User’s (i.e., student, faculty and staff) e-mail accounts as deemed appropriate;
  • The College considers Users to be informed and in receipt of correspondence sent to their Corning e-mail account;
  • Users are responsible for reading their College e-mail on a regular basis and for recognizing that certain communications are time sensitive;
  • Users who choose to have their College e-mail forwarded to an off‐campus account, do so at their own risk. The College is not responsible for any difficulties that may occur in the proper or timely transmission of, or access to, the College’s e-mail forwarded to an off‐campus e-mail account. Problems that occur as the result of the choice to forward e-mail will not absolve Users of their responsibilities to know and comply with the content of official e-mail communications.

Violators

The College reserves the right to limit, restrict, revoke, suspend, or deny privileges and access to College Resources as it deems in its best interests, including:

  • For the efficient and effective administration and maintenance of its Resources;
  • When necessary to investigate the possible breach of security, misuse of College Resources, violation of law, or infringement of College rules;
  • When required in connection with an academic, disciplinary, or administrative inquiry, or legal proceeding;
  • Such other times or instances as permitted by law.

In order to enforce this policy and to comply with the enforcement of federal, state and local laws, IT may monitor, inspect, and retain contents of transmissions and files of College Resources. If unauthorized use is found, IT will take immediate actions to remediate such abuse.

Violators of the Acceptable Use Policy will be subject to the College’s existing student or employee disciplinary procedures. Illegal acts involving College Resources may also subject Users to prosecution by local, state, or federal authorities.

Data Privacy

The College reserves the right to access, monitor, remove, and disclose any use of Resources, or to block access to Resources, without notice to Users, after (1) obtaining approval from an authorized College administrator, or, (2) receiving a court order or other legal demand, or, (3) determining that a compelling need exists to do so.

College Resources are copied, backed up, and/or stored long after they are created or last accessed. Resources believed to have been deleted by Users may be preserved in some storage medium and may be retrieved if necessary. While the College diligently safeguards its Resources, it cannot guarantee the security of Resources against unauthorized access or disclosure. Users, therefore, should exercise extreme caution in using electronic messaging to communicate confidential or sensitive matters, and should not assume that their electronic messaging is private or confidential.

In addition, the College is subject to public records statutes that require us to make available records we maintain—both paper and electronic—for public inspection.

Reporting an Abuse

To report a violation of this policy, send an e-mail message to helpdesk@corning-cc.edu, or call the Helpdesk at (607) 962-9555.

Changes to this Policy

The College reserves the right to change this Policy at any time. The Technology Planning and Advisory Committee will review the policy annually and will offer amendments, if necessary, to the Regional Board of Trustees for its approval. The College will post updates and will inform Users of such changes through MyCCC Announcements.

Questions about this Policy

Please send any questions about this Policy to the Director of Information Technology.