Policy and Guidelines for Responsible Computing at CU Colorado Springs
Modified: 2 July 2002
Approved: UCCS Faculty Assembly
UCCS Student Government
| A. Purpose of resources; privileges | 2 |
| B. General use | 2 |
| C. Specialized use | 2 |
| D. Expectation | 2 |
| E. Enforcement | 3 |
| III. User Responsibilities | 3 |
| IV. Appropriate Use Guidelines | 4 |
| A. Legal Guidelines | 4 |
| B. Account Guidelines | 5 |
| C. Email Guidelines | 5 |
| D. World Wide Web Guidelines | 5 |
| 1. Individual web pages | 6 |
| 2. Departmental and course web pages | 7 |
| E. System and Network Integrity Guidelines and policy | 8 |
| V. Privacy Issues | 8 |
| VI. Consequences of Illegal or Unethical Actions | 9 |
| A. Enforcement | 9 |
| B. Reporting | 9 |
| C.Illegal Activities | 9 |
| D.Notification of Policy Violation | 9 |
| E.Suspension of Privileges during Investigation | 10 |
| F. Procedures | 10 |
| VII.Acknowledgments | 10 |
| VIII.APPENDIX: IT Leadership Team | 11 |
I. Overview
In support of its mission of teaching, research, and public service, the University of Colorado at Colorado Springs provides access to computing and information resources for students, faculty, and staff of the University of Colorado within institutional priorities and financial capabilities. The Policy for Responsible Computing at UCCS contains the governing philosophy for regulating faculty, student, and staff use of the University's computing resources. It spells out the general principles regarding appropriate use of equipment, software, networks and data. In addition to this policy all members of the University community are also bound by local, state, and federal laws relating to copyrights, security, and other statutes regarding electronic media. Top
II. Policy
A. Purpose of resources; privileges.
CU Colorado Springs computing resources (facilities, equipment, systems, and personnel) are for the use of authorized individuals only and for use only in a manner consistent with each individual's authority. Access to and use of CU Colorado Springs computing resources is a privilege granted to authorized users for scholarly, research, academic, and administrative purposes. Authorized users include, but are not limited to, students, staff, faculty, and retired faculty and staff.
Central to appropriate and responsible use is the stipulation that, in general, computing resources shall be used in a manner consistent with the instructional, public service, research, and administrative objectives of the University. Use should also be consistent with the specific objectives of the project or task for which such use was authorized. All uses inconsistent with these objectives are considered to be inappropriate use and may jeopardize further access to services.
CU Colorado Springs's technology resources may not be used in any manner inconsistent with an individual's authority, prohibited by licenses, contracts, University policies, or local, state, or federal law. No one may grant permission for inappropriate use of computing resources, nor does the ability to perform inappropriate actions constitute permission to do so. All users of University-owned or University-leased technology systems (e.g., computers, networks, phones, media equipment, etc..) must respect the rights of other computer users, respect the integrity of the physical facilities and controls, and respect all pertinent license and contractual agreements.
University technology resources are not to be used for commercial purposes, personal gain, or non-University-related activities. Individuals using University information technology may not: (a) violate such matters as University or third party copyright or patent protection and authorizations, as well as license agreements and other contracts, (b) interfere with the intended use of the information resources, (c) seek to gain or gain unauthorized access to information resources, (d) without authorization, destroy, alter, dismantle, disfigure, prevent rightful access to or otherwise interfere with the integrity of computer-based information and/or information resources, (e) without authorization invade the privacy of individuals or entities that are creators, authors, users, or subjects of the information resources.
Under special circumstances, University technology resources can be used for commercial purposes when those purposes are within the interests of the University. See the Director of IT for contractual agreements and other details.
Members of the CU Colorado Springs community who use computing resources are expected to do so in an effective, efficient, appropriate, ethical, and legal manner. Use of campus computing resources, depends upon mutual respect and cooperation to ensure that all members of the CU Colorado Springs community have equal access, privileges, privacy, and protection from interference and harassment.
The University reserves the right to limit, restrict, revoke or extend computing privileges and access to its information resources. This policy applies equally to all University-owned or University-leased computers.
When you use the CU Colorado Springs computing services, you accept the following specific responsibilities:
IV. Appropriate Use Guidelines
The use of UCCS computing and network resources is a privilege that depends on using the resources appropriately. Appropriate use includes but is not limited to, adherence to the following guidelines:
You must use all CU Colorado Springs resources in strict accordance with local, state, and federal laws. These laws cover such areas as illegal access to computer systems, networks, and files; copyright violations; slander, defamation and libel; and harassment issues.
Once you have an account on any UCCS computer, you are responsible for any and all use made of that account. Accounts are granted for use for work and or study at the University.
The use of email must meet the same standards that would apply to the use of campus telephones and campus mail. Further, the use must not interfere with the operation of the computers and networks or with the work of others. Please refer to the Board of Regents policy on email as well as the campus email policy; these may be found at http://www.uccs.edu/~it/policiesmenu/policies.htm.
The creation of World Wide Web pages must meet the same use guidelines that apply to other computing resources. In particular, World Wide Web pages should be used in a manner consistent with the instructional, public service, research, and administrative objectives of the University. Use should also be consistent with the specific objectives of the project or task for which such use was authorized. All uses inconsistent with these objectives are considered to be inappropriate use and may jeopardize further access to services.
Individual web pages are encouraged for the following purposes:
Individual web pages should not be put to inappropriate uses, which are those uses that are inconsistent with the instructional, public service, research, and administrative objectives of the University. In particular, inappropriate uses include but are not limited to:
2. Departmental and course web pages
Departmental and course pages are encouraged for the following purposes:
E. System and Network Integrity Guidelines and policy
You must respect the integrity of CU Colorado Springs systems and networks and other people's systems and networks. You must not access any CU Colorado Springs computers or networks nor any computers or networks connected to CU Colorado Springs without proper authorization. In no case may you disrupt or harm computers, computer software, computer data or information, or networks regardless of whether the computer, software, data, information, or network in question is owned by the University.
The Information Technology Department at CU Colorado Springs supports and maintains a number of servers for general campus usage. All servers connected to CU Colorado Springs campus network must be registered with the CU Colorado Springs Information Technology (IT) Department. This includes all web servers located outside of the IT department.
The University of Colorado will make reasonable efforts to maintain the integrity and effective operation of its technology systems, but users are advised that those systems should in no way be regarded as a secure medium for the communication of sensitive or confidential information. Because of the nature and technology of electronic communication, the University can assure neither the privacy nor the confidentiality of an individual user's use of the University's technology resources. To be clear, the user has no right to privacy concerning the use of University's technology resources.
In addition, Colorado law provides that communications of University personnel that are sent by electronic mail may constitute "correspondence" and, therefore, may be considered public records subject to public inspection under Colorado's Public Records Act, C.R.S. 24-72-203.
VI. Consequences of Illegal or Unethical Actions
Actions that are illegal or against University policy will be referred to the appropriate officials regardless of whether or not a computer was involved in their commission. The Information Technology Department's role is to provide technical assistance to the authorities. IT may monitor user activities and access any files or information in the course of performing normal system and network maintenance or while investigating possible violations of laws or policy. Anyone using University resources expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of criminal activity, IT will provide the evidence to law enforcement officials.
Violations of CU Colorado Springs Computing Policies may result in disciplinary action, including, but not limited to, suspension of access to the WWW, suspension of email privileges, suspension of computing privileges, suspension or expulsion from the University, suspension or termination of employment, imposition of fines, and referral for legal action. The IT Director may recommend to proper campus authorities through proper campus procedures that disciplinary action be taken against the violator.
Any individuals who become aware of inappropriate, unethical, or illegal use of CU Colorado Springs computing resources, inappropriate content of an individual home page, or any inappropriate electronic communication should notify the Director of Information Technology.
Any illegal activity, particularly those that involve child pornography, will be immediately referred to the CU Colorado Springs Police Department and will also be subject to the procedures that follow.
D. Notification of Policy Violation
The Director of Information Technology Department will notify the user who is alleged to have violated campus computing policies of the nature of the alleged violation and will provide the user with a copy of campus Computing Policies.
E. Suspension of Privileges during Investigation
During the investigation of an alleged policy violation, a user's computing and network access may be suspended. CU Colorado Springs reserves the right to examine a user's recorded and stored information in the course of investigating an alleged policy violation.
1. The IT Director will review the materials or activity alleged to be in violation of CU Colorado Springs's Computing Policies. If the IT Director believes that the actions or materials violate the policies, the IT Director is authorized to terminate the activity and/or to remove violating materials.
2. If the alleged violator fails or refuses to comply with the IT Director's actions, the IT Director may impose sanctions including suspension of access to the WWW, suspension of email privileges, or suspension of all computing privileges or may refer the matter to the CU Colorado Springs IT Leadership Team (IT Director, Vice Chancellor for Academic Affairs, Vice Chancellor for Student Success, Vice Chancellor for Administration and Finance, and the Senior Faculty Associate for Information Technology) for action. (See the attached appendix for the IT Leadership Team document.)
3. If the alleged violator disagrees with the IT Director, the user may file a written petition requesting the IT Leadership Team to review the case.
4. The IT Leadership Team, in consultation with the alleged policy violator, will appoint a three-person committee to review the case. The committee will consist of a student, a faculty member and a staff person. At least one member will also be a member of the IT Advisory Council. The IT Director will not be a member of this committee.
5. After consulting with the alleged violator and with the IT Director, the committee will determine (a) if a policy violation has occurred and, (b) if a policy violation has been found, what action should be taken to remedy the policy violation.
6. In the event that the committee's decision is appealed, an appropriate recourse will be established by the IT Leadership Team, in consultation with the Staff Council, Faculty Assembly, and Student Government.
These policy guidelines include language adapted from those of many other universities and departments, including the University of Colorado at Denver, University of Delaware, the University of Michigan, the University of Washington, the University of Virginia, and Massachusetts Institute of Technology. Top
VIII. APPENDIX: IT Leadership Team
Overview Information Technology (IT) has become a pervasive and transcendental resource at CU Colorado Springs. Every unit on campus has become increasingly reliant on IT, which includes computing services, media, and telecommunications. Consequently, information technology must be viewed as an institutional resource and requires careful strategic management. This document outlines how the campus has organized to ensure that IT institutional strategic management has been implemented.
Resources Information Technology is a tool that supports the instructional, research and administrative needs of CU Colorado Springs. The IT Department at CU Colorado Springs supports the IT infrastructure on campus while some specialized needs of various units are supported either by the CU System or by the units themselves. A description of the division of the basic, common and specialized services are available in the Information Technology Services and Responsibilities Memorandum of Understanding Draft. The IT Department is led by the Director of IT, who is responsible for the operation of this department and for assisting in the guidance of IT direction on campus.
The Senior Faculty Associate for Information Technology regularly represents the broad IT perspective on the campus Executive Team, and helps to lead the campus toward a strategic vision for IT by participating in the IT Leadership Team and by chairing the IT Advisory Council (see below for details). In addition, the Senior Faculty Associate will act as a liaison to the CU system on major technology policy committees, manage the Student Technology Fee, serve as chair of the Student Technology Fee Committee, work closely with the campus governance organizations, provide leadership in developing and updating the campus technology plan, provide the linkage of the instructional, research, and administrative management needs to the overall technology decisions of the campus, and ensure that information technology supports the entire University towards fulfilling its educational mission.
Team approach Since IT strategy must reflect not only the mission of the campus but the needs of Academic Affairs, Administration and Finance, and Student Success, the vision, direction and priority setting of IT must include the leadership from these three areas. Further, it is absolutely essential that input from the users is reflected in the IT strategy. Finally, the IT strategy must include the operational aspect of IT. As a result, the campus has chosen to use a team approach in order to ensure that a clear IT strategy, which reflects the needs of all the campus.
Membership The VCAA, VCAF, VCSS, IT Director, and the Senior Faculty Associate for IT.
Responsibilities The IT Leadership team is to provide overall leadership to the strategic direction of IT at CU Colorado Springs
Membership IT Director, Senior Faculty Associate for IT (Chair), and representatives of major user groups within AA, AF, and SS. Members will serve 3 year terms on a rotating basis. One Vice Chancellor will sit as ex-officio member on a rotating basis.
Responsibilities The IT Advisory Council is responsible for advising and providing input to the IT Leadership Team regarding the information technology strategic direction, priorities, and policies at CU Colorado Springs. With direction from the IT Leadership Team, the IT Advisory Council will:
Membership IT Director (chair), key IT managers and staff, and representatives of user groups selected by the IT Advisory Council. The Senior Faculty Associate will sit on the Council as an Ex Officio member. Representatives serve 3-year terms.
Responsibilities The IT Operating Committee is responsible for providing guidance and assistance to the IT Director with the operational activities of the campus Information Technology department. The IT Operating Committee is NOT to be an oversight committee nor is it to micromanage the IT Department. Instead, the IT Operating Committee is to increase communication between IT operations and the end users. In addition, the IT Operating Committee provides input to the IT Advisory Council concerning IT operating issues that have strategic importance. The IT Director, who chairs the IT Operating Committee, will file reports to the Chair of the IT Advisory Council that summarize and strategic recommendations made by the IT Operating Committee are brought to the IT Advisory Council for review and approval.
Frequency of meetings Once per month throughout the calendar year.
Academic Computing Policy Committee
Membership All regular faculty who currently sit on the ITAC. The chair of the ACPC shall selected by election from the ACPC members.
Responsibilities The ACPC is responsible for reporting information between the ITAC and the Faculty Assembly and is charged with making recommendations concerning IT issues that directly affect the academic areas on campus.
Frequency of meetings: As needed.
