Acceptable Use Policy
Contents
1.0 Purpose
2.0 Scope
3.0 Privacy
4.0 Policy
4.1 Fraudulent and Illegal Use
4.2 Confidential Information
4.3 Harassment
4.4 Incident Reporting
4.5 Malicious Activity
4.5.1 Denial of Service
4.5.2 Confidentiality
4.5.3 Impersonation
4.5.4 Network Discovery
4.6 Objectionable Content
4.7 Hardware and Software
4.8 Messaging
4.9 Remote Working
4.9 Other
5.0 Roles and responsibilities
6.0 Enforcement
7.0 Exceptions
8.0 References
9.0 Related Policies
10.0 Responsible Department
11.0 Policy Authority
1.0 PURPOSE
Illinois Wesleyan University (IWU)’s technology infrastructure exists to support the
institution
and administrative activities needed to fulfill the institution’s mission. Access
to these resources
is a privilege that should be exercised responsibly, ethically and lawfully.
The purpose of this Acceptable Use Policy is to clearly establish each member of the
institution’s
role in protecting its information assets and communicate minimum expectations for
meeting
these requirements. Fulfilling these objectives will enable IWU to implement a comprehensive
system-wide Information Security Program.
2.0 SCOPE
This policy applies to all users of computing resources owned, managed or otherwise
provided
by the institution. Individuals covered by this policy include, but are not limited
to all faculty,
staff, students, student workers, service providers, and guests with access to the
institution’s
computing resources and/or facilities. Computing resources include all IWU owned,
licensed or
managed hardware and software, email domains and related services and any use of the
institution’s network via a physical or wireless connection, regardless of the ownership
of the
computer or device connected to the network.
3.0 PRIVACY
IWU will make every reasonable effort to respect a user's privacy. However, faculty,
staff,
students, student workers, service providers, and guests do not acquire a right of
privacy for
communications transmitted or stored on the institution’s resources. Additionally,
in response to
a judicial order or any other action required by law or permitted by official IWU
policy or as
otherwise considered reasonably necessary to protect or promote the legitimate interests
of the
institution, the University President may authorize an IWU official or an authorized
agent, to
access, review, monitor and/or disclose computer files associated with an individual's
account.
Examples of situations where the exercise of this authority would be warranted include,
but are
not limited to, the investigation of violations of law or the institution’s rules,
regulations or
policies, or when access is considered necessary to conduct IWU business due to the
unexpected
absence of faculty, staff or student workers or to respond to health or safety emergencies.
4.0 POLICY
Activities related to the IWU mission take precedence over computing pursuits of a
more
personal or recreational nature. Any use that disrupts the institution’s mission is
prohibited.
Following the same standards of common sense, courtesy and civility that govern the
use of other
shared facilities, acceptable use of information technology resources generally respects
all
individuals' privacy, while protecting the right of individuals to be free from intimidation
and/or
harassment. All users of IWU’s computing resources must adhere to the requirements
below.
4.1 FRAUDULENT AND ILLEGAL USE
IWU explicitly prohibits the use of any information system for fraudulent and/or illegal
purposes.
While using any of the institution’s information systems, a user must not engage in
any activity
that is illegal under local, state, federal, and/or international law. As a part of
this policy, users
must not:
- Violate the rights of any individual, company, or the University involving information
protected by copyright, trade secret, patent or other intellectual property, or similar laws
or regulations, including, but not limited to, the installation or distribution of pirated or
other software products that are not appropriately licensed for use by IWU. - Use of copyrighted material including, but not limited to, photographs, books, or
other copyrighted sources, copyrighted music, and any copyrighted software that is
not consistent with the universities published policies and practices. Refer to IWU’s
published Copyright Policies and Practices here: https://libguides.iwu.edu/copyright - Export software, technical information, encryption software, or technology in violation
of international or regional export control laws. - Issue statements about warranty, expressed or implied, unless it is a part of normal
job
duties, or make fraudulent offers of products, items, and/or services.
Any user that suspects or is aware of the occurrence of any activity described in
this section, or
any other activity they believe may be fraudulent or illegal, must notify his/her
supervisor
immediately.
If any user creates any liability on behalf of IWU due to inappropriate use of the
institution’s
resources, the user agrees to indemnify and hold the institution harmless, should
it be necessary
for IWU to defend itself against the activities or actions of the user.
4.2 CONFIDENTIAL INFORMATION
IWU has both an ethical and legal responsibility for protecting confidential information
in
accordance with its Data Classification Policy. To that end, there are some general
positions that
the institution has taken:
- Transmission of confidential information by end-user messaging technologies (for
example, e-mail, instant messaging, SMS, chat, etc.) is prohibited. - The writing or storage of confidential information on mobile devices (phones, tablets,
USB drives) and removable media is prohibited. Mobile devices that access confidential
information will be physically secured when not in use and located to minimize the risk
of unauthorized access. - All faculty, staff, students, student workers, service providers, and guests will
use
approved workstations or devices to access the institution’s data, systems, or networks.
Non-institution owned workstations that store, process, transmit, or access confidential
information are prohibited. Accessing, storage, or processing confidential information on
home computers is prohibited. - All institution portable workstations will be securely maintained by the user such
workstations will be handled as carry-on (hand) baggage on public transport. They will
be concealed and/or locked when in private transport (e.g., locked in the trunk of an
automobile) when not in use. - Photographic, video, audio, or other recording equipment will not be utilized in secure
areas. - All confidential information stored on workstations and mobile devices must be
encrypted. - All faculty, staff and student workers who use institution-owned workstations will
take
all reasonable precautions to protect the confidentiality, integrity and availability of
information contained on the workstation. - Institution faculty, staff, student workers, and vendors who move electronic media
or
information systems containing confidential information are responsible for the
subsequent use of such items and will take all appropriate and reasonable actions to
protect against damage, theft and unauthorized use. - Institution employees will activate their workstation locking software whenever they
leave their workstation unattended or will log off from or lock their workstation when
their shift is complete. - When using a public computer for a presentation, be sure to delete the presentation
on
the public computer.
4.3 HARASSMENT
- IWU is committed to providing a safe and productive environment, free from harassment,
for all
faculty, staff, students, student workers, service providers, and guests. For this reason, users must
not: - Use institution information systems to harass any other person via email, telephone,
or
any other means, or - Actively procure or transmit material that is in violation of sexual harassment or
hostile
workplace laws.
If a user feels he/she is being harassed through the use of the institution’s information systems,
the user must report it, in writing, to his/her supervisor or any department head, who in turn
must report it to Human Resources within 2 business days.
4.4 INCIDENT REPORTING
IWU is committed to responding to security incidents involving personnel, institution-owned
information or institution-owned information assets. As part of this policy:
- The loss, theft or inappropriate use of institution access credentials (e.g. passwords,
key
cards or security tokens), assets (e.g. laptop, cell phones), or other information will be
reported to the IT Service Desk. - No faculty, staff, student worker, or vendor will prevent another member from
reporting a security incident.
4.5 MALICIOUS ACTIVITY
IWU strictly prohibits the use of information systems for malicious activity against
other users,
the institution’s information systems themselves, or the information assets of other
parties.
4.5.1 DENIAL OF SERVICE
Users must not:
- Perpetrate, cause, or in any way enable disruption of IWU’s information systems or
network communications by denial-of-service methods; - Knowingly introduce malicious programs, such as viruses, worms, and Trojan horses,
to
any information system; or - Intentionally develop or use programs to infiltrate a computer, computing system,
or
network and/or damage or alter the software components of a computer, computing
system or network.
4.5.2 CONFIDENTIALITY
Users must not:
- Perpetrate, cause, or in any way enable security breaches, including, but not limited
to,
accessing data of which the user is not an intended recipient or logging into a server or
account that the user is not expressly authorized to access; - Facilitate use or access by non-authorized users, including sharing their password
or
other login credentials with anyone, including other users, family members, or friends; - Use the same password for IWU accounts as for other non-IWU access (for example,
personal ISP account, social media, benefits, email, etc.); - Attempt to gain access to files and resources to which they have not been granted
permission, whether or not such access is technically possible, including attempting to
obtain, obtaining, and/or using another user’s password; or - Make copies of another user’s files without that user’s knowledge and consent.
- All encryption keys employed by users must be provided to Information Technology if
requested, in order to perform functions required by this policy. - Base passwords on something that can be easily guessed or obtained using personal
information (e.g. names, favorite sports teams, etc.).
4.5.3 IMPERSONATION
Users must not:
- Circumvent the user authentication or security of any information system;
- Add, remove, or modify any identifying network header information (“spoofing”) or
attempt to impersonate any person by using forged headers or other identifying
information; - Create and/or use a proxy server of any kind, other than those provided by IWU, or
otherwise redirect network traffic outside of normal routing with authorization; or - Use any type of technology designed to mask, hide, or modify their identity or activities
electronically.
4.5.4 NETWORK DISCOVERY
Users must not:
- Use a port scanning tool targeting either IWU’s network or any other external network,
unless this activity is a part of the user’s normal job functions, such as a member of the
Office of Information Technology, conducting a vulnerability scan, and faculty utilizing
tools in a controlled environment. - Use a network-monitoring tool or perform any kind of network monitoring that will
intercept data not intended for the user’s, unless this activity is a part of the user’s normal
job functions.
4.6 PREVENTING DISCRIMINATION AND HARASSMENT
Users must not post, upload, download, or display messages, photos, images, sound
files, text files,
video files, newsletters, or related materials considered to be harassing or discriminating
based
on the following characteristics:
- actual or perceived race, color, creed, religion, national origin, ancestry, citizenship
status,
age, sex or gender (including pregnancy, childbirth, related medical conditions and
lactation), - gender identity or gender expression (including transgender status),
- sexual orientation,
- marital status,
- military service and veteran status,
- disability,
- protected medical condition as defined by applicable state or local law,
- genetic information,
- or any other characteristic protected by applicable federal, state, or local laws
and
ordinances.
Note that any academic content required for completion of course activities and/or
academic
research is exempt from this policy requirement.
4.7 HARDWARE AND SOFTWARE
IWU strictly prohibits the use of any hardware or software that is not purchased,
installed,
configured, tracked, and managed by the institution. Users must not:
- Install, attach, connect or remove or disconnect, hardware of any kind, including
wireless
access points, storage devices, and peripherals, to any institution information system
without the knowledge and permission of Information Technology; - Download, install, disable, remove or uninstall software of any kind, including patches
of
existing software, to any institution information system without the knowledge and
permission of the institution; - Use personal flash drives, or other USB based storage media, without prior approval
from
their supervisor; or - Take IWU equipment off-site without prior authorization from the supervisor..
4.8 MESSAGING
The institution provides a robust communication platform for users to fulfill its
mission. Users
must not:
- Automatically forward electronic messages of any kind, by using client message handling
rules or any other mechanism without prior approval from Information Technology; - Send unsolicited electronic messages, including “junk mail” or other advertising material
to individuals who did not specifically request such material (spam); - Solicit electronic messages for any other digital identifier (e.g. e-mail address,
social
handle, etc.), other than that of the poster's account, with the intent to harass or to collect
replies; or - Create or forward chain letters or messages, including those that promote “pyramid”
schemes of any type.
4.9 REMOTE WORKING
When working remotely, user must:
- Safeguard and protect any institution-owned or managed computing asset (e.g. laptops
and cell phones) to prevent loss or theft. - Not utilize personally-owned computing devices for IWU work, including transferring
IWU information to personally-owned devices, unless approved by the Chief
Information Officer. - Take reasonable precautions to prevent unauthorized parties from utilizing computing
assets or viewing IWU information processed, stored or transmitted on institutionowned assets. - Not create or store confidential or private information on local machines unless a
current backup copy is available elsewhere. - Not access or process confidential information in public places or over public, insecure
networks. - Only use approved methods for connecting to the institution (e.g. VPN).
4.9 OTHER
In addition to the other parts of this policy, users must not:
- Stream video, music, or other multimedia content unless this content is required to
perform the user’s normal business functions; - Use the institution’s information systems for commercial use or personal gain; or
- Use the institution’s information systems to play games or provide similar entertainment
unless required to perform the user’s normal business functions.
5.0 ROLES AND RESPONSIBILITIES
IWU reserves the right to protect, repair, and maintain the institution’s computing
equipment
and network integrity. In accomplishing this goal, IWU IT personnel or their agents
must do their
utmost to maintain user privacy, including the content of personal files and Internet
activities.
Any information obtained by IT personnel about a user through routine maintenance
of the
institution’s computing equipment or network should remain confidential, unless the
information pertains to activities that are not compliant with acceptable use of IWU’s
computing
resources.
6.0 ENFORCEMENT
Enforcement is the responsibility of the University’s President or designee. Users
who violate this
policy may be denied access to the institution resources and may be subject to penalties
and
disciplinary action both within and outside of IWU. The institution may temporarily
suspend or
block access to an account, prior to the initiation or completion of disciplinary
procedures, when
it reasonably appears necessary to do so in order to protect the integrity, security,
or functionality
of the institution or other computing resources or to protect IWU from liability.
Users are subject to disciplinary rules described in the applicable handbook(s), and
other policies
and procedures governing acceptable workplace behavior.
7.0 EXCEPTIONS
Exceptions to the policy may be granted by the Chief Information Officer, or by his
or her
designee. All exceptions must be reviewed annually. Any exception granted by the Chief
Information Officer shall be communicated in writing to the President of the University
and
respective Vice President within one (1) business day of the exception being granted.
8.0 REFERENCES
- The Gramm - Leach Bliley Act (GLBA)
- Family Educational Rights and Privacy Act (FERPA)
- New York State Information Security Breach and Notification Act
- NIST 800-53
- FIPS-199
- PCI DSS 4.0
- New York Civil Practice Law and Rules § 4509
- Code of Ethics of the American Library Association
9.0 RELATED POLICIES
- Information Security Policy
- Data Classification Policy
- Data Classification and Handling Procedure
10.0 RESPONSIBLE DEPARTMENT
Information Technology Security and Infrastructure
11.0 POLICY AUTHORITY
This policy is issued by the President's Cabinet for Illinois Wesleyan University.
12.0 REVISION HISTORY
13.0 APPROVALS