Policy 8.03
Page 2 of 10
will enable Penn College to implement a comprehensive system-wide Information
Security Program.
II. SCOPE
This policy applies to all users of computing resources owned, managed, or
otherwise provided by the institution. Individuals covered by this policy include,
but are not limited to all students, faculty, staff, student workers and service
providers with access to the institution’s computing resources and/or facilities.
Computing resources include all Penn College-owned, licensed, or managed
hardware and software, email, and web domains and related services and any use
of the institution’s network via a physical or wireless connection, regardless of the
ownership of the computer or device connected to the network.
III. PRIVACY
Penn College will make every reasonable effort to respect a user's privacy.
However, users do not acquire a right of privacy for communications transmitted
or stored on the institution’s resources. Additionally, in response to a judicial
order or any other action required by law or permitted by official Penn College
policy or as otherwise considered reasonably necessary to protect or promote the
legitimate interests of the institution, the President of the institution may authorize
a Penn College official or an authorized agent, to access, review, monitor and/or
disclose computer files associated with an individual's account. Examples of
situations where the exercise of this authority would be warranted include, but are
not limited to, the investigation of violations of law or the institution’s rules,
regulations, or policy, or when access is considered necessary to conduct Penn
College business due to the unexpected absence of faculty, staff, or student
workers or to respond to health or safety emergencies.
IV. POLICY
Activities related to Penn College’s mission take precedence over computing
pursuits of a more personal or recreational nature. Any use that disrupts the
institution’s mission is prohibited.
Following the same standards of common sense, courtesy and civility that govern
the use of other shared facilities, acceptable use of information technology
resources generally respects all individuals' privacy, but subject to the right of
individuals to be free from intimidation, harassment, and unwarranted annoyance.
All users of Penn College’s computing resources must adhere to the requirements
enumerated below as well as other College Policies and Procedures.
A. FRAUDULENT AND ILLEGAL USE
Penn College explicitly prohibits the use of any College information system or
network resources for fraudulent and/or illegal purposes. While using any of the
institution’s information systems or network resources, a user must not engage in
any activity that is illegal under local, state, federal, and/or international law. As a
part of this policy, users must not: