II. Responsible Use of Information Technology Resources
I. Purpose
Information Technology at Metro State is an educational and administrative
resource for all faculty, staff and students. IT serves as a major means of
official communication with the public, and is also a business asset. At the
same time, the sense of community at Metro State consists of personal as well as
professional relationships. Metro State is a place where freedom of expression
and inquiry is valued and protected. It is important to establish a balanced
approach to the use of IT resources-one that facilitates all these
priorities.
Respect for the views of others with whom we disagree is important if we are to get the full benefit of our expressive freedom, and demonstrating mature judgment is an important element of personal integrity and credibility. Therefore, Metro State encourages IT users to follow the Ten Principles of Civility in Cyberspace. However, although rude or impolite behavior such as "flame wars", "hate speech", spammed solicitations, and off-topic-list postings may be annoying, occasional breaches of civility do not violate specific laws or rules.
II. Policy
The same rules and laws that apply in physical space also apply in
cyberspace. Standards of academic freedom and professional conduct for
employees, and the rights and responsibilities of students govern conduct online
as much as they do in the hallways, offices and classrooms. Unauthorized access
to and sharing of confidential student information (including computer
passwords), or certain electronic confidential employment records (including
computer passwords) violates state and federal law. Illegal activity such as
copyright infringement, patent infringement, fraud, forgery, distribution of
child pornography and forms of criminal harassment, including bomb threats and
hoaxes is just as criminal online as elsewhere. Moreover, some special laws
apply to the electronic environment, including State and federal computer
security laws and laws prohibiting interference with college operations.
Downloading material that violates the College's legal obligations and
contractual commitments (e.g. software and recording piracy) will not be
tolerated. Finally, actions that adversely affect Metro State IT resources, or
the ability of others to use them are prohibited. For example, e-mail, bombing,
spamming, and releasing or operating a damaging program such as a virus, could
result in cessation of the offender's access to IT resources in addition to
other penalties, such as College Disciplinary action, up to and including
termination of employment or expulsion from the College.
Within the above restrictions, employees and students may use MSCD's IT
resources for incidental, non-commercial personal communication so long as such
use clearly and specifically communicates to the viewer that the individual is
speaking in a personal capacity and not for the College. However, users should
be aware that, although Metro State will not routinely monitor communications or
search individual computer files, individual privacy cannot be guaranteed with
respect to personal communication and related records. Most computer data and
documents created, used, or maintained by Metro State employees are not
confidential: and must be disclosed to the public on request under the Colorado
Open Records Act. In addition, Metro State cannot prevent individuals from
monitoring unencrypted e-mail sent through outside servers.
MSCD IT staff members are authorized and able electronically to access
electronic programs, data, and files stored on College equipment as may be
necessary to perform their duties. Except in emergencies, they will notify users
and specify a time before accessing desktop computers and files. Any objections
to IT staff access should be addressed in writing to the department chair or
director-level supervisor and to an IT administrator at the director level. IT
staff in the course of their duties may find evidence of illegal or unauthorized
activity. If they do, their responsibility is to report such evidence in writing
to their director. Authorization may be granted for a full search of computer
programs and data. In that event, the user will be notified.
Approved: December 2001
Revised: December
2004
