Access to and use of the Ivy Tech Community College of Indiana computer resources is an educational opportunity which is a privilege extended by the College to students, faculty, employees and other authorized users to promote the mission of the College and support the instructional and administrative activities of the College. Computer resources are defined as including, but not limited to, hardware, software, systems, networks, data stored, transmitted or accessed using College computers and college provided access to Electronic Mail (e-mail), Intranet, Internet, World Wide Web, or any other internal or external service, server or provider. Any activity that violates local, state or federal law or ignores common standards of honesty, privacy and decency is a violation of College policy.
Users of these services and facilities have access to valuable College resources, to sensitive data and to external networks. Consequently, it is important for all users to behave in a responsible, ethical and legal manner. In general, appropriate use means respecting the rights of other computer users, the integrity of the physical facilities and all pertinent license and contractual agreements. This document establishes more specific guidelines for the use of all college computing resources.
Appropriate Computing Behavior
The following list, while not exhaustive, provides some specific guidelines for responsible and ethical behavior:
1. Access to computing resources
In support of its mission of teaching and training, Ivy Tech Community College of Indiana provides access to information technology and resources for the College-related use by students. This includes but is not limited to computers, computer terminals, peripheral computer hardware, software, networks, and the information that can be access using these tools.
Students will receive a user id and password for the college portal - MyIvy, web-based systems, e-mail and other computer systems for activities related to instruction or College administration. Recognized student organizations at Ivy Tech Community College of Indiana may also obtain ID's when authorized by the Dean of Student Affairs.
Computer accounts, passwords, and other types of authorization are assigned to individual users and should not be shared with others. Violation of this policy may result in the loss of computing privileges or other disciplinary action. The user should select an obscure account password and change it frequently.
2. Data security and integrity
Information Services and Information Security provides reasonable security against intrusion and damage to files stored on the central computing facilities.
Users should use all available methods to protect their files, including the frequent changing of their passwords, encryption of data, and storing back-up copies of information off site. In the event that data have been corrupted, as a result of intrusion, the regional computing administrator or relevant faculty member should be notified immediately.
This statement sets forth the College's policy with regard to use of, access to, and disclosure of electronic mail (e-mail) to assist in ensuring that the College's resources serve those purposes and applies to the Ivy Tech e-mail system and other student e-mail systems. E-mail is not considered to be private. E-mail which is composed, sent received, or stored on College equipment may be subject to monitoring and review. Do no send any e-mail message which you would not want reviewed by a third party. E-mail is not to be used to post or relay chain letters or any manner of threatening, abusive, unwelcome or unwanted messages.
Ivy Tech Community College of Indiana will make reasonable efforts to maintain the integrity and effective operation of its electronic mail systems, but users are advised that those systems should in no way be regarded as a secure medium for the communication of sensitive or confidential information. Because of the nature and technology of electronic communication, the College can assure neither the privacy of an individual user's use of the College's e-mail resources nor the confidentiality of particular messages that may be created, transmitted, received, or stored thereby.
College staff and e-mail administrators may see the contents of e-mail due to serious addressing errors or as a result of maintaining the e-mail system. In those cases where College staff may see the contents of private e-mail, they are required to keep the contents confidential. Users should also be aware that the current design of the Internet is such that the privacy of e-mail that leaves Ivy Tech Community College of Indiana cannot be guaranteed.
E-mail accounts are backed up as a regular course of network operation. The deletion of an e-mail message does not remove all copies of the messages. Once sent, an e-mail message will not be deleted or altered by the College's system administrators, or any other College sponsored parties. The College is not liable for lost or deleted messages.
Only students and other persons who have received permission under the appropriate College authority are authorized users of the College's electronic mail systems and resources.
Prohibited Uses of Electronic Mail
1. Prohibited Purposes
2.Other Prohibited Uses
Other prohibited uses of electronic mail include, but are not limited to
College Employees Access to Electronic Mail
Electronic mail of students may constitute "education records" subject to the provisions of the federal statute known as the Family Educational Rights and Privacy Act of 1974 (FERPA). The College may access, inspect, and disclose such records under conditions that are set forth in the statute.
Student Conduct and Disciplinary Action
The reputation of Ivy Tech and the community depends, in large part, upon the behavior of its students. Students enrolled at the College are expected to conduct themselves in a mature, dignified and honorable manner. Students are entitled to a learning atmosphere free from discrimination, harassment, sexual harassment and intimidation. This applies in the conduct between faculty and staff to students, student to student, and students to faculty and staff.
Students are subject to College jurisdiction while enrolled at Ivy Tech. The College reserves the right to take disciplinary action against any student whose conduct, in the opinion of Ivy Tech representatives, has not been in the best interests of the student, other students, or the College. All Ivy Tech students are expected to abide the College rules of conduct (see College Catalog or Student Handbook.) Appropriate disciplinary action will be taken against individuals found to have engaged in prohibited use of the College's computing systems and e-mail resources.
Summary of Applicable Laws
Computer and network use is also subject to Indiana and Federal laws and regulations. Suspected violations of applicable law are subject to investigation by College and law enforcement officials. Among the applicable laws are (other laws may apply as well):
Federal Copyright Law: U.S. copyright law grants authors certain exclusive rights of reproduction, adaptation, distribution, performance, display, attribution and integrity to their creations, including works of literature, photographs, music, software, film and video. Violations of copyright laws include, but are not limited to, the making of unauthorized copies of any copyrighted material (such as commercial software, text, graphic images, audio and video recordings) and distributing copyrighted materials over computer networks or through other means.
Federal Wire Fraud Law: Federal law prohibits the use of interstate communications systems (phone, wire, radio, or television transmissions) to further an illegal scheme or to defraud.
Federal Computer Fraud and Abuse Law: Federal law prohibits unauthorized access to, or modification of information in computers containing national defense, banking, or financial information.
Federal Child Pornography Laws: Federal and Indiana laws prohibit the creation, possession, or distribution of graphic depictions of minors engaged in sexual activity, including computer graphics. Computers storing such information can be seized as evidence.
Pyramid schemes/Chain Letters: It is a violation of the Federal Postal Lottery Statute to send chain letters which request sending money or something of value through the U.S. mail. Solicitations through electronic messaging are also illegal, if they require use of U.S. mail for sending money/something of value.
Defamation: Someone may seek civil remedies if they can show that they were clearly identified as the subject of defamatory messages and suffered damages as a consequence. Truth is a defense against charges of defamation.
Common law actions for invasion of privacy: Someone may take seek civil remedies for invasion of privacy on several grounds.
Public disclosure of private facts: the widespread disclosure of facts about a person, even when true, may be deemed harmful enough to justify a lawsuit.
False light: a person wrongfully attributes views or characteristics to another person in ways that damage that person's reputation.
Wrongful intrusion: the law often protects those areas of a person's life in which they can reasonably expect they will not be intruded upon.