The purpose of this policy is to outline the acceptable use of College-owned or leased technology resources, specifically providing guidelines to protect against the inappropriate use of such resources leading to an increased risk for virus attack, compromised network systems and services and/or illegal activity
This policy applies to information and technology (including, but not limited to computer equipment, software, operating systems, storage media, internal networks and network accounts, email, internet, and cloud service) that is owned or leased by the College and provided in furtherance of the College's mission and/or in support of its administrative and academic activities
Technology resources as defined above are to be used for serving the interests of the College, our students, and the community.
College proprietary information stored on electronic and computing devices whether owned or leased by Lakeland, the employee or a third party, remains the sole property of Lakeland and will be secured through legal or technical means in accordance with relevant policies: Data Security and Privacy Assurance (3354:2-11-04), Identity Theft Protection (3354:2-11-05), and FERPA Policy for the Confidentiality and Review of Student Records (3354:2-63-01).
General Use and Ownership Access
All employees, students, contractors, consultants, and stakeholders of the College are responsible for exercising good judgment with respect to the appropriate use of information and technology as defined above in accordance with the College's policies, procedures, and standards, as well as local, state, federal, and/or international laws and regulations.
Stakeholders may access, use, or share College proprietary information only to the extent it is authorized and necessary to fulfill assigned responsibilities of the stakeholder's role. Stakeholders have a responsibility to promptly report the theft, loss, or unauthorized disclosure of the College's proprietary information.
Individual departments are responsible for creating guidelines for the personal use of internet/intranet/extranet systems. In the absence of such guidelines, employees should refer to College policies including but not limited to the following minimum access standards for all mobile and computing devices connecting to the College's internal network:
System level and user level passwords must comply with minimum password standards:
A minimum number of 7 characters
At least 2 alpha and 2 non-alpha characters
Not be a part of username, not be a dictionary word, or contain more than 3 consecutive characters or numbers
Authentication and security standards:
All mobile devices must have authentication enabled to gain access to the device.
All computing devices must be secured with a mobile security enabled authentication (finger scan/PIN/facial scan) or password-protected screensaver with the automatic activation feature set to 10 minutes or less, unless Administrative Technologies approves an exception.
Employees must lock the screen or log off when the device is unattended.
Security updates and patches shall be applied in a timely manner, or automatically when possible.
The operating system must be supported by the developer.
Anti-virus shall be installed and updated automatically or in a timely manner, when possible.
Miscellaneous:
Files including personal data must be encrypted before being transferred electronically.
Providing access to another individual, either deliberately or through failure to secure its access is prohibited.
Postings by employees from a College email address to newsgroups should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of Lakeland, unless posting is while performing business or educational responsibilities.
Employees must use extreme caution when opening emails that may appear to contain malware and contact Administrative Technologies for assistance.
The College reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy. For security and network maintenance purposes, authorized individuals within Administrative Technologies may monitor equipment, systems, and network traffic at any time.
Unacceptable Use
Under no circumstances is a user authorized to engage in any activity that is illegal under local, state, federal or international law while utilizing College-owned resources. The non-exhaustive list of activities below is generally prohibited unless an employee is exempted from these restrictions while performing legitimate job responsibilities (e.g., systems administration staff may have a need to disable the network access of a host if that host is disrupting production services).
Prohibited Activities Related to System and Network Access
Violating the rights of any person or company protected by copyright, trade secret, patent or other intellectual property, or similar laws or regulations, including but not limited to, the installation or distribution of software products that are not appropriately licensed for use by the College
Unauthorized copying of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, books or other copyrighted sources, copyrighted music, and the installation of any copyrighted software for which the College or the end user does not have an active license is strictly prohibited, unless following the rules for fair use for educational purposes
Accessing the College data, servers, or accounts for any purpose other than conducting the College business, even if access is authorized
Introducing malicious programs into the network or server (e.g., viruses, worms, Trojan horses, email bombs, etc.)
Revealing account passwords to others or permitting others to use personal accounts (apart from Administrative Technologies employees working to setup or repair an issue)
Using a College computing asset to actively engage in procuring or transmitting material that is in violation of sexual harassment or hostile workplace laws in the user's local jurisdiction
Making fraudulent offers of products, items, or services originating from any College account
Effecting security breaches or disruptions of network communication. Security breaches include but are not limited to accessing data of which the employee is not an intended recipient or logging into a server or account that the employee is not expressly authorized to access unless these duties are within the scope of regular duties. For purposes of this section, "disruption" includes but is not limited to network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information for malicious purposes.
Port scanning or security scanning unless prior notification is made to Administrative Technologies
Executing any form of network monitoring which will intercept data not intended for the employee's host unless this activity is a part of the employee's normal job/duty
Circumventing user authentication or security of any host, network, or account
Introducing honeypots, honeynets, or similar technology on the College network
Interfering with or denying service to any user other than the employee's host (for example, denial of service attack)
Using any program/script/command, or sending messages of any kind, with the intent to interfere with or disable a user's terminal session via any means, locally or via the internet/intranet/extranet
Providing private non-directory information about College employees to parties outside Lakeland, unless legally required or as part of contracted college systems
Prohibited Activities Related to Email and Internet Access
Sending unsolicited external email messages, including the sending of ‘junk mail' or other advertising in bulk to individuals who did not specifically request such material (email spam) unless an exception is coordinated through the Marketing Department, following their guidelines
Harassment via email, telephone, text, or paging whether through language, frequency, or size of messages
Unauthorized use, or forging, of email header information
Solicitation of email for any other email address, other than that of the poster's account, with the intent to harass or to collect replies
Creating or forwarding ‘chain letter', ‘Ponzi', or other ‘pyramid' schemes of any type
Using for private or personal business or for other for-profit activities or institutions
Posting the same or similar non-business-related messages to large numbers of newsgroups (newsgroup spam)
Prohibited Activities Related to Social Media Use
Limited and occasional use of the College's systems to access and engage in social media platforms for personal use is acceptable if it does not otherwise violate College policy and does not interfere with an employee's regular work duties. Social media use from the College's systems is also subject to monitoring.
Policies noted in A(2)(b) above apply to social media. As such, employees are prohibited from revealing any College confidential or proprietary information, trade secrets, private personal data or any other material covered by Lakeland's policies when engaged in social media.
When representing the College or running a College-based social media site, employees are prohibited from:
Engaging in any social media that may harm or tarnish the image, reputation and/or goodwill of the College and/or any of its employees
Making any discriminatory, disparaging, defaming, or harassing comments or otherwise engaging in any conduct prohibited by the College's Non-Discrimination and Anti-Harassment policy
Attributing personal statements, opinions, or beliefs to the College. Employees expressing their own beliefs and/or opinions in social media may not, expressly or implicitly, represent themselves as an employee or representative of the College, but may clearly indicate that the "opinions expressed are my own and not necessarily those of the College".
Using the College's trademarks, logos, and any other College intellectual property in connection with social media activity without permission from the Marketing Department
Policy Compliance
Administrative Technologies will verify compliance with this policy through various methods, including but not limited to business tool reports, internal and external audits, and feedback to the policy owner.
Any exception to the policy must be approved by Administrative Technologies in advance.
Any persons found to have violated this policy may be subject to disciplinary action, up to and including termination of employment or expulsion.