This policy defines the accountability of all (“Users”) as well as the boundaries of acceptable use of Baker College computing, communication, and technology resources. Baker College provides robust resources to support the information technology (IT) environment, including computers, data storage, mobile devices, electronic data, networks, software, email services, electronic information sources, voicemail, telephone services, and other products and services.
Introduction
This policy defines the accountability of all (“Users” – Any authorized individual, including faculty, staff, students, vendors, guests, or courtesy affiliate.) as well as the boundaries of acceptable use of Baker College computing and communication resources. Baker College provides robust resources to support the information technology (IT) environment, including computers, data storage, mobile devices, electronic data, networks, software, email services, electronic information sources, voicemail, telephone services, and other products and services.
Baker College’s computing and communication resources are the property of Baker College and are used to support the institution’s Guiding Principles, including the advancement of education, services, community, and administrative business support services.
IT resources are provided for the use of faculty, staff, students, and courtesy affiliates. This policy is intended to help protect Baker College and its constituents as it relates to privacy and confidentiality as well as the overall integrity of Baker College IT resources. Having a sound and effective information technology environment is essential to the Mission and Guiding Principles of Baker College.
When utilizing Baker College resources, you agree to the Acceptable Use Policy for Baker College Information Technology Resources language.
Applicability
This Policy applies to all individuals using Baker College resources, regardless of affiliation (faculty, staff, students, and courtesy affiliates) or where the resources are accessed or used, i.e. Baker College campus or remote locations.
For usage within the Baker College campus IT environment, additional rules may apply to specific resources, including classrooms, business systems, networks, software, social media, databases, and other services and support. Rules will be consistent with this policy and could potentially enact additional requirements and/or responsibilities on the Users.
Access to Baker College resources may be wholly or partially restricted without prior notice and without consent.
Access to this Policy will be granted to Users through the website, handbook and/or catalog.
General Authorized Usage Overview
Baker College resources are provided for College-specific objectives, including supporting the College’s mission, teaching, administrative actions, and student/student-life activities, including social media usage.
Users are granted access to Baker College IT resources and are responsible for all activity performed with their user IDs. Users should take appropriate precautions to ensure the security of their passwords and prevent others from obtaining access to their computer resources.
Inappropriate or supplementary use that inaccurately or inappropriately illustrates support or affiliation of products, services, or organizations, without written approval, is prohibited.
Usage of Baker College resources for supplementary personal use is done at the user’s own risk. The College cannot and will not guarantee the continued operation, support, or security of IT resources.
Users are responsible for informing themselves of any Baker College policies or regulations that control the use of College resources prior to resource usage.
Users are expected to respect the privacy of other Users, including usage, content, or identities.
Users are required to comply with state, federal, and local laws as well as College policies. Additionally, Users are required to adhere to the rules and regulations dictated by third parties.
Users are expected to engage in safe and responsible security and computing practices in order to maintain the integrity of Baker College resources.
Inappropriate Usage
The use of Baker College resources for private business, commercial activities, fund-raising, or advertising for non-College purposes is prohibited unless approved in advance.
Users must adhere to copyright, trade secret, patent, or other intellectual property or similar laws/regulations.
Using College resources for unlawful communications, including threats of violence, obscenity, child pornography, and harassing communication are prohibited and will immediately be reported to the local police department and/or campus safety.
Unauthorized access, modification, copies, or deletion of Users’ accounts or resources, including files, is not allowed.
Users cannot use IT resources in a manner that impacts usage or activities of the resources by other Users including, but not limited to, the introduction of malicious software or malware.
Unauthorized connectivity or access to Baker College resources is prohibited.
Interfering with the networking including, but not limited to, scanning, monitoring, intercepting, and altering network packets is expressly prohibited.
Baker College resources cannot be used to engage in patrician politics or promote/oppose ballot measures unless that use is approved by the President/CEO.
Users cannot access Baker College resources without the proper authority, which includes attempting to evade or circumvent user authentication and/or misrepresenting one’s identity or affiliation.
Email and Electronic Communications
Access to Baker College email is a privilege that may be wholly or partially restricted without prior notice and without consent of the user.
An activity that may strain the email or network facilities is a violation of this policy. These activities include, but are not limited to, sending chain letters and widespread dissemination of unsolicited email.
Modification or forging of email information, including the header, is prohibited.
Confidentiality of email or other electronic communication cannot be assured; therefore, Users should be aware of the risks when sending confidential, personal, financial, or sensitive information.
Social Media
For specific policies, procedures, and code of conduct, please reference the following documents: Baker College Student Social Media Code of Conduct and Baker College Faculty and Staff Social Media Policies and Procedures.
Baker College recognizes the important role that social media plays in our community. In support of this, there are a number of official social media accounts. As a student, if you want to create an official Baker College page or group, you must receive approval from the school. (The social media application is available at baker.edu.) When operating an official page or group, you are representing Baker College and, as such, you are required to adhere to the expectations and policies outlined below. Any violation of any of these policies, regardless of scale or visibility, will be addressed; as with offline violations of Baker College’s Code of Conduct, disciplinary action may be undertaken. Any deviation (even unintentional) from the policies and procedures could result in disciplinary action.
Privacy
Privacy is important to Baker College; however, Users should be aware that the data created or stored on Baker College resources remains the property of the College.
This includes, but is not limited to, college affiliated servers and content on campus file servers, Google Drive, and Microsoft OneDrive.
Users are expected to respect the privacy of other Users and not divulge personal data concerning faculty, staff, or students.
Authorized individuals of the Baker College IT environment will perform management tasks in a manner that fosters User trust.
The College does not routinely monitor individual usage; however, normal operations require the backup of data, logging of activities, monitoring general usage, logging files, and other similar activities. Baker College may access various resources in order to perform necessary maintenance, including security events.
Operational Security
The College may, without advance notice to Users, take any action necessary to protect the interests of Baker College to ensure that the IT resources are stable and secure. Any action necessary will be taken including monitoring and scanning College resources.
Third-party intrusions, viruses, and physical access can compromise computing and communication security. Baker College takes reasonable precautions to minimize risks. Users must notify and report incidents to [email protected].
Known or suspected violations of the Acceptable Use Policy or Social Media Policies should be reported immediately to [email protected].
Enforcement
Use of Baker College resources is a privilege and not a right. User’s access to Baker College IT resources may be limited, suspended, or terminated if that User violates the Policy. The IT Executive Committee will address alleged violations of this Policy.
In addition to review of alleged violation of this Policy, the College may be obligated to report incidents to law enforcement.
Users who violate this Policy, other College policies, or external laws will be subject to disciplinary action and/or penalties.
If the COO determines that a User has violated this Policy and determines that access should be limited or suspended, the User may appeal that decision to the System Executive Committee.