EAC – Information Technology Resource Usage Policy

Purpose

The purpose of this policy is to outline the acceptable uses of information technology resources for the Eastern Arizona College community. Whether from on or off campus, individuals and groups using EAC resources are responsible for complying with this policy.

Scope

This policy applies to all information technology resources, including but not limited to, equipment, software, networks, accounts, data, and telecommunications equipment whether owned, leased or otherwise provided by the college. EAC provides the resources to support the academic, administrative, and instructional objectives of the college. The use of these resources are limited to faculty, staff, college students and other authorized users to accomplish tasks appropriate to the responsibilities of the individual.

Policy

Acceptable Use Guidelines

Preserving the access to information resources is a community effort that requires each member to act responsibly and guard against abuses. Therefore, both the Eastern Arizona College community as a whole and each individual user have an obligation to abide by the following standards of acceptable use:

Unacceptable Use Guidelines

The following unacceptable uses apply to all uses of College information technology resources. In the constantly changing world of information technology, it is impossible to enumerate all non-acceptable uses of College computers, information systems, and networks. All users are expected to conduct themselves within acceptable use boundaries and may not infringe or assist others with the infringement of the following examples of unacceptable use.

Coordination with Other Policies and Laws

Users of information technology resources at EAC are subject to applicable federal, state, and local laws, applicable contracts and licenses, and other college policies, notably those governing copyright and intellectual property compliance. Users are responsible for ascertaining, understanding, and complying with the laws, rules, policies, contracts and licenses applicable to their particular uses.

Privacy and Security

There is no inherent expectation of privacy for information stored on EAC’s information technology resources, except as provided by federal and state law and other College policy. Every effort will be made to maintain individual privacy, but the College will not be liable for the failure of these privacy efforts. 

While the College does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the College's information technology resources require the backup and caching of data and communications, the logging of activity, the monitoring of general usage patterns, the scanning of systems and network ports for anomalies and vulnerabilities, and other such activities that are necessary for the execution of these services.

Enforcement

Any member of the Eastern Arizona College community found in violation of this policy may be denied access to College information technology resources and may be subject to disciplinary action, both outside and within the College.

Revision History

Last updated: 4/5/2019