Access to and use of the Ivy Tech Community College of Indiana computer resources is an educational opportunity which is a privilege extended by the College to students, faculty, employees and other authorized users to promote the mission of the College and support the instructional and administrative activities of the College. Computer resources are defined as including, but not limited to, hardware, software, systems, networks, data stored, transmitted or accessed using College computers and college provided access to Electronic Mail (e-mail), Intranet, Internet, World Wide Web, or any other internal or external service, server or provider. Any activity that violates local, state or federal law or ignores common standards of honesty, privacy and decency is a violation of College policy.

Users of these services and facilities have access to valuable College resources, to sensitive data and to external networks. Consequently, it is important for all users to behave in a responsible, ethical and legal manner. In general, appropriate use means respecting the rights of other computer users, the integrity of the physical facilities and all pertinent license and contractual agreements. This document establishes more specific guidelines for the use of all college computing resources.

Appropriate Computing Behavior

The following list, while not exhaustive, provides some specific guidelines for responsible and ethical behavior:

  1. Use only the computers, computer accounts and computer files for which you have authorization. Do not use another individual's ID or account, or attempt to capture or guess other users' passwords. Users are individually responsible for all use of resources assigned to them; therefore, sharing of accounts is prohibited.
  2. Obey established guidelines for any computers or networks used both inside and outside the College.
  3. Do not attempt to access restricted portions of the operating system, security software, or accounting software unless authorized by the appropriate College administrator. Breaking into computers is explicitly a violation.
  4. Abide by all state and federal laws. (see summary of state and federal laws at the end of this document)
  5. Respect the privacy and personal rights of others. Do not access or copy another user's e-mail, data, programs, or other files without permission.
  6. Use appropriate standards of courtesy and respect when using computing systems to communicate with other individuals. When sending personal messages to other users, always identify yourself as the sender. Using Ivy Tech Community College of Indiana's computing resources to harass other individuals deliberately is explicitly prohibited.
  7. Be sensitive to the needs of others, and use only your fair share of computing resources. For example, users of shared resources, such as the central computer or the public clusters, should use these facilities for only the most essential tasks during periods of peak demand. Broadcasting non-critical messages to large numbers of individuals and sending chain letters are examples of activities that cause network congestion and interfere with the work of others, and thus are not allowed.
  8. Computing resources and network capacity may not be used for illegal purposes.
    Examples of illegal purposes include:
    1. Intentional harassment of other users.
    2. Intentional destruction of or damage to equipment, software, or data belonging to Ivy Tech Community College of Indiana or other users.
    3. Intentional disruption or unauthorized monitoring of electronic communications.
    4. Unauthorized copying of copyrighted material.
  9. Computing resources and network capacity should be used in accordance with the high standards of the College. This includes using computer resources to gain information and research. The submission of work of someone else as one's own is considered unethical and constitutes academic dishonesty (plagiarism and cheating). The College strongly condemns academic dishonesty. Academic Honesty requires that ideas taken from another source for use of papers or projects be fully acknowledge. Examples of other unethical use of the Ivy Tech Community College Computing systems include:
    1. Violation of another user's privacy.
    2. Violations of computer system security.
    3. Violation of network usage policies and regulations.
    4. Violation of software license agreements.
    5. Unauthorized use of computer accounts, and passwords access codes.
    6. Intentional use of computer telecommunication facilities in ways that unnecessarily impede the computing activities of others.
    7. Use of computing facilities for private business purposes unrelated to the mission of the College.
  10. Copyright Policy - The use of any materials logos or other items copyrighted by Ivy Tech Community College of Indiana or others without the express permission is prohibited.
  11. Use of printers:
    1. Printing Internet web pages or other information not directly related to an authorized use is prohibited.
    2. Excess printing is prohibited. Student must follow lab guidelines limiting the number of copies or pages that may be printed. Larger projects may require the approval or permission of a lab assistant or faculty member.
    3. Using non-approved paper in a college-owned printer is prohibited.

Users' Access

1. Access to computing resources

In support of its mission of teaching and training, Ivy Tech Community College of Indiana provides access to information technology and resources for the College-related use by students. This includes but is not limited to computers, computer terminals, peripheral computer hardware, software, networks, and the information that can be access using these tools.

Students will receive a user id and password for the college portal - MyIvy, web-based systems, e-mail and other computer systems for activities related to instruction or College administration. Recognized student organizations at Ivy Tech Community College of Indiana may also obtain ID's when authorized by the Dean of Student Affairs.

Computer accounts, passwords, and other types of authorization are assigned to individual users and should not be shared with others. Violation of this policy may result in the loss of computing privileges or other disciplinary action. The user should select an obscure account password and change it frequently.

2. Data security and integrity

Information Services and Information Security provides reasonable security against intrusion and damage to files stored on the central computing facilities.

Users should use all available methods to protect their files, including the frequent changing of their passwords, encryption of data, and storing back-up copies of information off site. In the event that data have been corrupted, as a result of intrusion, the regional computing administrator or relevant faculty member should be notified immediately.

Electronic Mail
This statement sets forth the College's policy with regard to use of, access to, and disclosure of electronic mail (e-mail) to assist in ensuring that the College's resources serve those purposes and applies to the Ivy Tech e-mail system and other student e-mail systems. E-mail is not considered to be private. E-mail which is composed, sent received, or stored on College equipment may be subject to monitoring and review. Do no send any e-mail message which you would not want reviewed by a third party. E-mail is not to be used to post or relay chain letters or any manner of threatening, abusive, unwelcome or unwanted messages.

Ivy Tech Community College of Indiana will make reasonable efforts to maintain the integrity and effective operation of its electronic mail systems, but users are advised that those systems should in no way be regarded as a secure medium for the communication of sensitive or confidential information. Because of the nature and technology of electronic communication, the College can assure neither the privacy of an individual user's use of the College's e-mail resources nor the confidentiality of particular messages that may be created, transmitted, received, or stored thereby.

College staff and e-mail administrators may see the contents of e-mail due to serious addressing errors or as a result of maintaining the e-mail system. In those cases where College staff may see the contents of private e-mail, they are required to keep the contents confidential. Users should also be aware that the current design of the Internet is such that the privacy of e-mail that leaves Ivy Tech Community College of Indiana cannot be guaranteed.

E-mail accounts are backed up as a regular course of network operation. The deletion of an e-mail message does not remove all copies of the messages. Once sent, an e-mail message will not be deleted or altered by the College's system administrators, or any other College sponsored parties. The College is not liable for lost or deleted messages.

Only students and other persons who have received permission under the appropriate College authority are authorized users of the College's electronic mail systems and resources.

Prohibited Uses of Electronic Mail

1. Prohibited Purposes

  1. Excessive personal use that creates a direct cost for the College is prohibited.
  2. The College's electronic mail resources shall not be used for personal monetary gain or for commercial purposes that are not directly related to College business.

2.Other Prohibited Uses

Other prohibited uses of electronic mail include, but are not limited to

  1. Sending copies of documents in violation of copyright laws.
  2. Inclusion of the work of others into electronic mail communications in violation of copyright laws.
  3. Use of electronic mail to harass or intimidate others or to interfere with the ability of others to conduct College business.
  4. Use of electronic mail systems for any purpose restricted or prohibited by laws or regulations.
  5. Constructing an electronic mail communication so it appears to be from someone else.
  6. Obtaining access to the files or electronic mail of others for the purpose of prying or snooping is prohibited.
  7. Attempting unauthorized access to electronic mail or attempting to violate any security measures on any electronic mail system, or attempting to intercept any electronic mail transmissions.
  8. Use computer programs to decode passwords or access control information.
  9. Attempt to circumvent or subvert system security measures.
  10. Knowingly engage in any activity that causes harm to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, or damaging files.

College Employees Access to Electronic Mail

Electronic mail of students may constitute "education records" subject to the provisions of the federal statute known as the Family Educational Rights and Privacy Act of 1974 (FERPA). The College may access, inspect, and disclose such records under conditions that are set forth in the statute.

  1. Monitoring of Communications
    The College will not monitor electronic mail as a routine matter but it may do so to the extent permitted by law as the College deems necessary for purposes of maintaining the integrity and effective operation of the College's electronic mail systems.
  2. Inspection and Disclosure of Communications (computer files, documents and e-mails)
    The College reserves the right to inspect and disclose the contents of e-mail:
    1. in the course of an investigation triggered by indications of misconduct or misuse,
    2. as needed to protect health and safety,· as needed to prevent interference with the academic mission, or
    3. as needed to locate substantive information required for College business that is not more readily available by some other means.
      The College will inspect and disclose the contents of e-mail when such action is necessary to respond to legal processes and to fulfill the College's obligations to third parties.
  3. Limitations on Disclosure and Use of Information Obtained by Means of Access or Monitoring
    The contents of e-mail communications, properly obtained for College purposes, may be disclosed without permission of the user. The College will attempt to refrain from disclosure of particular communications if disclosure appears likely to create personal embarrassment, unless such disclosure is required to serve a business purpose or satisfy a legal obligation.
  4. Special Procedures to Approve Access to, Disclosure of, or Use of Electronic Mail Communications
    Individuals needing to access the e-mail communications of others, to use information gained from such access, and/or to disclose information from such access and who do not have the prior consent of the user must obtain approval in advance of such activity from the appropriate College authority. That procedure shall take into consideration ways to minimize the time and effort required to submit and respond to requests, the need to minimize interference with College business, and protection of the rights of individuals.

Student Conduct and Disciplinary Action

The reputation of Ivy Tech and the community depends, in large part, upon the behavior of its students. Students enrolled at the College are expected to conduct themselves in a mature, dignified and honorable manner. Students are entitled to a learning atmosphere free from discrimination, harassment, sexual harassment and intimidation. This applies in the conduct between faculty and staff to students, student to student, and students to faculty and staff.

Students are subject to College jurisdiction while enrolled at Ivy Tech. The College reserves the right to take disciplinary action against any student whose conduct, in the opinion of Ivy Tech representatives, has not been in the best interests of the student, other students, or the College. All Ivy Tech students are expected to abide the College rules of conduct (see College Catalog or Student Handbook.) Appropriate disciplinary action will be taken against individuals found to have engaged in prohibited use of the College's computing systems and e-mail resources.

Summary of Applicable Laws

Computer and network use is also subject to Indiana and Federal laws and regulations. Suspected violations of applicable law are subject to investigation by College and law enforcement officials. Among the applicable laws are (other laws may apply as well):

Federal Copyright Law: U.S. copyright law grants authors certain exclusive rights of reproduction, adaptation, distribution, performance, display, attribution and integrity to their creations, including works of literature, photographs, music, software, film and video. Violations of copyright laws include, but are not limited to, the making of unauthorized copies of any copyrighted material (such as commercial software, text, graphic images, audio and video recordings) and distributing copyrighted materials over computer networks or through other means.

Federal Wire Fraud Law: Federal law prohibits the use of interstate communications systems (phone, wire, radio, or television transmissions) to further an illegal scheme or to defraud.

Federal Computer Fraud and Abuse Law: Federal law prohibits unauthorized access to, or modification of information in computers containing national defense, banking, or financial information.

Federal Child Pornography Laws: Federal and Indiana laws prohibit the creation, possession, or distribution of graphic depictions of minors engaged in sexual activity, including computer graphics. Computers storing such information can be seized as evidence.

Pyramid schemes/Chain Letters: It is a violation of the Federal Postal Lottery Statute to send chain letters which request sending money or something of value through the U.S. mail. Solicitations through electronic messaging are also illegal, if they require use of U.S. mail for sending money/something of value.

Defamation: Someone may seek civil remedies if they can show that they were clearly identified as the subject of defamatory messages and suffered damages as a consequence. Truth is a defense against charges of defamation.

Common law actions for invasion of privacy: Someone may take seek civil remedies for invasion of privacy on several grounds.

Public disclosure of private facts: the widespread disclosure of facts about a person, even when true, may be deemed harmful enough to justify a lawsuit.

False light: a person wrongfully attributes views or characteristics to another person in ways that damage that person's reputation.

Wrongful intrusion: the law often protects those areas of a person's life in which they can reasonably expect they will not be intruded upon.