Tab

Security

Technology Use Policy – Security

Passwords – Change your password often (at least every 180 days).  A password is your “key” to Alverno’s technology resources.  When choosing a password, use the following guidelines:

Use at least six characters (a combination of letters and numbers); cannot reuse the last three passwords

  • Pick a password that is easy for you to remember, but that others would not likely be able to guess
  • Do not write down your password because someone might see it and use it
  • Choose a unique password (not the same password for your Datatel access, automatic teller machine or answering machine)
  • NEVER share your password with other individuals.  Remember, they could use your password, delete your files, impersonate you, or change your password to lock you out

Access Restrictions - Do not distribute your password or the password of another user. This is a serious violation of this policy. Attempting to disable or determine an access password (or assisting others in doing so) is prohibited. Such activities threaten the work and privacy of many individuals. Respect the restrictions imposed by the technology resources of other individuals and organizations. Do not attempt to circumvent access restrictions. Violation is grounds for immediate suspension of access privileges or other disciplinary action. Such activities threaten the work and privacy of many individuals.

Use of Others’ Technology Resources - When using the technology resources of others through Alverno’s facilities, these policies apply.  Information providers or networks outside Alverno College may also impose their own conditions for use and you are responsible for following any additional restrictions.

Monitoring and User Privacy - Treat all electronic communications as potentially accessible by others.  Please consider this before sending confidential information electronically.  Alverno College considers electronic mail and other electronic information to be private although it is Alverno property and can be accessed by Alverno personnel.  Although this information must be accessed by system personnel for the purpose of backups, network management or troubleshooting and maintenance, the content of user files and network transmissions will not be viewed, monitored or altered without the consent of the user, unless the College has reason to believe that an account or system has been breached and is being used by someone other than the authorized user, the College has received a complaint that an account or system is being used to gain unauthorized access or to attempt to gain unauthorized access to another network site or the College has reason to believe that an account or system is being used in violation of the Technology Use Policy, federal or state law or impacts system integrity. In these circumstances, the Campus Network Security Team, Director of Human Resources, Dean of Students or other person of authority may authorize system support personnel to monitor the activities of a specified account or computer system and to search electronic information stored in that account. The authority for this search must be requested on an account-by-account basis and monitoring will be restricted to the specified account. If this search provides evidence of a violation, the account will be disabled and action will be taken with the proper authorities. 

Disciplinary Actions

Alverno College reserves the right to revoke the technology access of any user at any time regardless of enrollment or employment status. Procedures for disciplinary actions involving students are outlined in the Student Handbook; disciplinary procedures for staff and faculty are described in Alverno: How It Works. Alverno College reserves the right to take the following actions in response to technology violations:

  • Send a verbal, written, or electronic mail warning;
  • Allow only restricted access privileges
  • Suspend computer or other technology access for a temporary time
  • Revoke all computer or other technology privileges;
  • Assign an “Unsatisfactory” (if violation relates to student course work);
  • Allow other discipline up to and including dismissal from the College or termination of employment.

Minor infractions of the Technology Use Policies, when accidental, such as consuming excessive resources or overloading computer systems, are generally resolved informally. This is done through electronic mail or in-person discussion and education. Repeated minor infractions or more serious misconduct may result in additional disciplinary actions. 

More serious violations include, but are not limited to:

  • Unauthorized use of computer resources
  • Copyright violations
  • Attempts to steal passwords or data
  • Transfer or display of offensive material
  • Harassment, or threatening behavior

In addition, offenders may be referred to their supervisor or other appropriate College offices for further action.  If the individual is a student, the matter may be referred to the College Community Relations Board for disciplinary action. Any offense which violates local, state, or federal laws may result in the immediate loss of all technology privileges and will be referred to the College Community Relations Board (students), your superior (faculty/staff) or other appropriate College offices and/or law enforcement authorities.

In cases where the integrity or functionality of the network or a multi-user system is in jeopardy, College personnel involved in network security are authorized to take immediate steps to prevent further damage - up to and including disabling user accounts and disconnecting a user’s computer from the campus network.