FERPA / en Information Technology Acceptable Use Policy /policy/information-technology-acceptable-use-policy Information Technology Acceptable Use Policy reedc Mon, 03/13/2023 - 15:33 Image 1-021 Cabinet 08-01-1989 09-06-2022 Category General College Computing and Information Technology 585-245-5577

This policy defines guidelines on the acceptable use of computing resources owned, operated, and managed by 黑料网. This policy applies to all persons accessing or using Geneseo鈥檚 technology resources, including all faculty, staff, students, affiliates, volunteers, or visitors at the College, hereafter referred to as users.

This policy is intended to promote excellent information and network security posture for 黑料网 and to specify acceptable and unacceptable activities involving 黑料网鈥檚 computing resources.

The purpose of this policy is to outline the acceptable use of computing resources and any information maintained in any form and any medium within the College's computing resources and explain violations of acceptable use. Additionally, all creation, processing, communication, distribution, storage, and disposal of information by any combination of college resources and non-college resources are covered by this policy. 

Access to information technology is essential to the college鈥檚 mission. The privilege to use computing resources requires that each faculty member, staff member, student, and other user comply with institutional and external standards for appropriate use, whether on campus or from remote locations.

To assist and ensure such compliance, 黑料网 establishes the following policy, which supplements all applicable SUNY and College policies, including harassment, patent and copyright, student and employee disciplinary policies, and FERPA, as well as applicable federal and state laws.

黑料网 values the privacy rights of all individuals using its computing resources. As a usual business practice, Geneseo does not routinely monitor individual usage of its computing resources. Nonetheless, users should be aware that all computing resources are the property of Geneseo. As such, the college may access and monitor computing resources and any information stored on or transmitted through those computing resources, but only in accordance with applicable laws, for legitimate business purposes including, but not limited to, system monitoring and maintenance, complying with legal requirements, police investigations, investigating security incidents, and administering this or other Geneseo policies. Further, to protect systems on the Geneseo network, the college may, without prior notice if deemed necessary, remove compromised devices from the network, block malicious traffic from entering the network, and prohibit devices within Geneseo's network from connecting to known malicious outside entities.

Computing Resources FERPA Mass Digital Communications Multi-Factor Authentication (MFA)

Acceptable Use

Computing resources at 黑料网 are provided for educational and business purposes. As a convenience to the Geneseo user community, limited incidental personal use of computing resources is permitted. Faculty and staff are responsible for exercising good judgment about personal use in accordance with Geneseo and SUNY policies and ethical standards for state officers and employees. In general, State officers and employees are charged to pursue a course of conduct that will not raise suspicion among the public that they are likely to be engaged in acts in violation of the public trust. Examples of incidental personal use may include sending an occasional personal email or visiting a non-work-related website. Incidental personal use must comply with the following:

  1. It cannot be illegal.
  2. It cannot interfere with a Geneseo employee's job responsibilities.
  3. It cannot adversely affect the availability, integrity, or reliability of Geneseo IT systems or cause harm to the activities of others using the IT systems.
  4. It cannot be inconsistent with the College's status as a state entity and its non-profit, tax-exempt status.

College-provided devices (i.e., laptops, desktops, tablets) shall not be shared with or used by anyone other than the primary user. 

College employees should use separate non-Geneseo accounts, email addresses, and devices for personal activities. Personally owned devices should not be used to access sensitive Geneseo data (e.g., FERPA or HIPAA protected information). 

Resources

The College's information technology resources are, by nature, finite. All members of the college community must recognize that specific uses of college information technology resources may be limited for reasons related to the capacity or security of the college's information technology systems or as required for fulfilling the College's mission.

Although there is no set bandwidth, disk space, CPU time, or other limits applicable to all uses of college computing resources, the college may require users of those resources to limit or refrain from specific uses if, in the opinion of the system administrator, such use interferes with the efficient operations of the system. Users are also expected to refrain from deliberately wasteful practices such as , performing endless unnecessary computations, or holding public computers for long periods when others are waiting for the same resources.

User Accounts

Users are responsible for ascertaining what authorizations are necessary and obtaining them before using college computing resources. The use of 黑料网's computer systems and network requires that the College issue a user account. Every computer user account issued by 黑料网 is the responsibility of the person whose name it is issued. Users are responsible for any activity originating from their accounts that which they can reasonably be expected to control. Under any circumstances, accounts and passwords may not be used by persons other than those to whom the account administrator has assigned them. In cases when unauthorized use of accounts or resources is detected or suspected, the account owner should change the password and .

College recognized clubs and student organizations may be issued a user account. Faculty advisors shall designate a particular person(s) (e.g., club president) authorized to act on behalf of the club or organization. This person(s) is responsible for all activity on the account and will be subject to College disciplinary procedures for misuse. 

The college employs various measures to protect the security of its computing resources and its user's accounts. Users should be aware, however, that the college cannot guarantee security and confidentiality. Users should therefore engage in "safe computing" practices using long complex passphrases, employing Multi-Factor Authentication, and guarding their passwords and MFA methods. 

Laws and College Policies

Users of college computing resources must comply with federal and state laws, college rules and policies, and the terms of applicable contracts, including software licenses, while using college computing resources. Users who engage in electronic communications with persons in other states or countries or on other systems or networks may also be subject to the laws of those jurisdictions and the rules and policies of those other systems and networks. Users with questions about how the various laws, rules and resolutions may apply to a particular use of college computing resources should contact the Office of the CIO for more information.

Users must use computing resources consistent with local, state and federal laws and policies and college policies. Examples include but are not limited to:

  1. Users shall comply with federal copyright law.
  2. Users shall not download, use or distribute illegally obtained media (e.g., software, music, movies).
  3. Users shall not upload, download, distribute or possess child pornography.

Mass Digital Communications

Mass digital communications at Geneseo are intended solely to communicate important information regarding academic, college, and student business to students, faculty, and staff. 

Unsolicited mass communications are not permitted. This policy must not be circumvented by sending multiple messages to smaller populations. Opt-in mailing lists for projects, student organizations, or external groups can use . Centrally managed  are restricted to messages that meet their purpose. 

Security & Privacy

Users should be aware that their college computing resources' use is not private. The college always retains ownership of its computing resources. Such ownership provides the college with an inherent right of access. While the college does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the college's computing resources require backup of data and communications, logging of activity, monitoring general usage patterns, and other activities necessary for the provision of service. The college may also monitor or inspect the activity of individual users of college computing resources, including individual login sessions and the content of individual communications, or delete user content that is not required to be kept by retention policy without notice or permission when:

  1. The user has voluntarily made them accessible to the public by posting to a web page.
  2. It reasonably appears necessary to protect the integrity, security, or functionality of college or other computing resources or to protect the college from liability.
  3. There is reasonable cause to believe that the user has violated or is violating this policy or any other law or policy.
  4. An account appears to be engaged in malicious, unusual, or excessive activity.
  5. Accessing the account is otherwise required or permitted by law, including but not limited to freedom of information laws, laws governing the conduct of parties engaged in or anticipating litigation, and laws governing criminal investigations.

Users shall respect the privacy of others. Users shall not intentionally view information of other users, modify or obtain copies of other user's files, access or attempt to access other users' email, or modify other users' passwords without their permission. Unless the information is specifically made public or accessible to you, you should assume anything on the network is private. Just because you may have the ability, through a loophole, someone's carelessness, etc., to access files, directories, or information that does not belong to you, you do not have the right to do so. Any attempt to circumvent computer, network, or file security or to take advantage of security lapses is prohibited.

Violations of Acceptable Use 

Violations of this Policy include, but are not limited to: 

  1. Illegal Use - Using computing resources to upload, download, transmit, post, or store any material or data that, intentionally or unintentionally, violates any applicable local, state, national or international law, or violates the rules, policies, or procedures of the College or any college department is prohibited. Transmitting, uploading, downloading, or storing any material that infringes upon an existing copyright, trademark, patent, trade secret, or other legal right using computing resources is also prohibited.
  2. Threats or Harassment - Using computing resources to transmit material or data that causes or encourages physical or intellectual abuse, damage, or destruction of property, or that causes or encourages harassment, explicit or implied, is prohibited.
  3. Forgery or Impersonation - Falsifying or removing identifying information on computing resources with intent to deceive, defraud, or misguide is prohibited. Impersonation of other persons or groups with the intent to harm is prohibited.
  4. Malicious Content - Use of Geneseo computing and messaging systems to transmit any material which contains malicious content, such as malware or phishing scams, or any other content that may damage computer systems or collect or misuse personal information is prohibited.
  5. Fraudulent Activity - Using computing resources to transmit material or communications to promote a financial scam or wrongdoing is prohibited.
  6. Unauthorized Access or Penetration Attempts (i.e., 鈥渉acking鈥) - Unauthorized access or penetration attempts of Geneseo computing resources, or a remote entity using 黑料网 computing resources, are prohibited. Users must not use computing resources to impair or damage the operations of any computers, networks, terminals, or peripherals.
  7. Intercepting Communications - Using packet sniffers, password capture applications, keystroke loggers, and other tools that perform similar behavior or any form of network wiretapping on Computing Resources is prohibited. Using such tools to diagnose, analyze, or mitigate ongoing service issues or security violations may be permitted when conducted by authorized personnel.
  8. Reselling Services - Computing resources are not to be used for personal commercial purposes or personal financial or other gains.
  9. Service Interruptions - Using computing resources to permit or promote activity that adversely affects the integrity or performance of computing resources is prohibited. Denial of service attacks, forged packet transmission, and similar actions may be permitted when conducted by authorized College personnel.
  10. Physical Security - Unauthorized access to, destruction, extension, or alteration of, theft, damage, or tampering of any physical computing resources, including computer workstations, kiosks, card swipes, printers, audio-visual equipment, telephone/fax equipment, classroom equipment, or wiring closets is prohibited. This applies to all network wiring, hardware, and in-room jacks. Users shall not use the residential network to provide Internet access to anyone outside of the College community for any purpose other than those that are in direct support of the academic mission of the College.
  11. Transferring of Use - Permission to use computing resources is granted to individuals and may not be transferred to others. Sharing of a username/password assigned to an individual is expressly prohibited. Use of another user's ID or seeking to access another user's account is prohibited. Similarly, individuals may not use their user credentials to provide access to Geneseo's wireless network to other individuals. The following will be considered theft of services.
    1. Acquiring a username in another person's name.
    2. Using a username without the explicit permission of the owner and Computing & Information Technology.
    3. Allowing one's username to be used by another person without the explicit permission of Computing & Information Technology.
    4. Using former system and access privileges after association with Geneseo has ended.
  12. Interference with or Transmission of Wireless Signals - Interfering with Geneseo's wireless networks or attaching a device to transmit a Geneseo network is strictly prohibited.
  13. Circumvention of controls 鈥 Deliberately circumventing security controls or exploiting vulnerabilities at Geneseo or any other network from Geneseo equipment or network is prohibited. Gaining access by exceeding the limits of assigned authorization is likewise prohibited. Users shall not develop or use procedures to alter or avoid the accounting and monitoring of the use of computing facilities. For example, users may not utilize facilities anonymously or by using an alias. They may not send messages, mail, or print files that do not show the correct username of the user performing the operation.
  14. Excessive or Unreasonable Use - Users shall not use information technology resources to excess. Excessive use of information technology resources by a particular user or for a particular activity reduces the amount of resources available to satisfy the needs of other users. Excessive use may degrade or jeopardize system functionality and result in significant costs to the college. Some examples of excess use may include writing a program or script or using an Internet bot to perform a repetitive task such as attempting to register for a class or purchasing concert tickets online.
  15. Abuse of incidental personal use - Incidental personal use must not:
    1. Be illegal.
    2. Interfere with a Geneseo employee's job responsibilities/work.
    3. Interfere with the legitimate education and business purposes of Geneseo.
    4. Result in any measurable cost to the College.
    5. Adversely affect the availability, integrity, or reliability of Geneseo IT systems or cause harm to the activities of others using the IT systems.
    6. Violate this policy or other College or SUNY policies.
    7. Be inconsistent with the College鈥檚 status as a state entity and its non-profit, tax-exempt status.
    8. Be for personal gain.

Reporting & Enforcement

Violations of this Policy may be reported through one's supervisor, Office of the CIO, the CIT HelpDesk, or the Information Security Incident Report Form, or as otherwise permitted through College policy.

Users who violate this policy may be denied access to college computing resources and may be subject to other penalties and disciplinary action, including possible expulsion or dismissal. Alleged violations will be handled through the college disciplinary procedures applicable to the user. The college may suspend, block, or restrict access to an account, independent of such procedures, when it reasonably appears necessary to protect the integrity, security, or functionality of college or other computing resources or to protect the college from liability. The college may also refer suspected violations of applicable law to appropriate law enforcement agencies.

When Computing & Information Technology becomes aware of a possible violation, we will initiate an investigation with relevant campus offices, such as the Dean of Students, Human Resources, and University Police. Users are expected to cooperate fully in such investigations when requested.

To prevent further unauthorized activity during such an investigation, Computing & Information Technology may suspend authorization for the use of all computing facilities for the user(s) involved in the violation.

Every 3 Years

09-06-2022 Sue Chichester CIO and Director, CIT 08-01-1989 ]]>
Mon, 13 Mar 2023 19:33:01 +0000 reedc 149672 at
Social Security Number Policy /policy/social-security-number-policy Social Security Number Policy Anonymous (not verified) Mon, 09/30/2019 - 11:24 Image 1-020 Cabinet 01-01-2009 02-07-2017 Category General College Chief Information Officer 585-245-5577

This policy applies to all departments, faculty, staff, and students at the College. Social Security Numbers are highly confidential and legally protected data. Geneseo is committed to protecting the privacy and legal rights of its community members and to protecting community members from identity theft, one of the fastest-growing crimes.

The purpose of this policy is to:

  1. To protect the privacy and legal rights of the members of the College community.
  2. To generate broad awareness of the confidential nature of the Social Security Number.
  3. To reduce the use of the Social Security Number (including partial SSN) for identification purposes.
  4. To promote confidence by students and employees that Social Security Numbers are handled in a confidential manner.
Federal Privacy Act of 1974 FERPA NY State Law: Chapter 16, Article 1, Title 1, Section 2b NY State Information Security Breach and Notification Act Social Security Number

It is the policy at Geneseo that the use of the Social Security Number as a common identifier and the primary key to databases be discontinued, except where required for employment, financial aid, and a limited number of other business transactions.

Disclosure statements will be provided whenever a Social Security Number is requested, in compliance with the Federal Privacy Act of 1974.

  1. Control and approval of the use of Social Security Number in any electronic system or form is assigned to the Information Security team. Social Security Numbers should be collected only for the purpose of processing student loans, employment, and to meet other legal obligations. The collection, use, and dissemination of student SSNs or any part thereof for other purposes is strongly discouraged. For SSN access in Banner, a director or department head must submit a Banner Social Security Number Access Request Form. To request approval to use SSN on any other electronic system or to request SSN on a form (electronic or paper), a director or department head must submit a .
  2. A Geneseo ID Number will be assigned to all students, employees, and associated individuals at the earliest point possible in the individual鈥檚 contact and association with the College. The Geneseo ID Number replaces the Social Security Number as the preferred common, unique identifier and key to Geneseo databases. Where possible, the Geneseo ID Number will be used in all future electronic and paper data systems to identify, track, and service individuals associated with the College.
  3. All forms on which persons are required to provide Social Security Numbers must contain or have appended to them a statement explaining the College request; e.g., the legal obligation on which the request is based, if there is one and the use that will be made of the Social Security Number.
    • For example, on an employment form, the following text can be used: The Federal Privacy Act of 1974 requires that you be notified that disclosure of your Social Security Number is required pursuant to the Internal Revenue Service Code. The Social Security Number is required to verify your identity.
    • If the Social Security Number is not required, but requested, the fact that supplying it is voluntary should be noted and the option of assigning a temporary, 鈥渄ummy number鈥 should be offered.
      • For example, when SSN is voluntary, the following text may be used: The Federal Privacy Act of 1974 requires that you be notified that disclosure of your Social Security Number is voluntary and not required on this form. If you do not choose to disclose your Social Security Number, a temporary identification number will be generated for you.
    • If the Social Security Number is not mandated by law, but is needed for a business purpose, e.g., in the early stages of the admissions process (e.g., to match standardized test scores such as SATs, ACTs, etc.), a disclosure statement of the following form may be used: The Federal Privacy Act of 1974 requires that you be notified that disclosure of your Social Security Number is not mandated by law, however, the College uses your Social Security Number to match your application credentials correctly and quickly.
      • Except where the College is legally required to collect a Social Security Number, individuals will not be required to provide their Social Security Number, verbally or in writing, at any point of service, nor will they be denied access to those services should they refuse to provide a Social Security Number. However, individuals may volunteer their Social Security Number, if they wish, if the primary means for identification is unavailable.
      • Social Security Numbers will be stored as a confidential attribute associated with an individual. They will be used as allowed and mandated by law.
      • Social Security Numbers will not be publicly displayed on any list or roster.
      • Encryption of Social Security Numbers is required between server and client workstations and whenever data are transmitted over public unsecured networks. Web applications transmitting SSN must use https encryption. Email must be encrypted if transmitting SSN over email is unavoidable.
      • Paper and electronic documents containing Social Security Numbers will be handled, used, and disposed of in a proper fashion. Proper disposal is defined as any method that shreds the record before the disposal of the record; or destroys the personal identifying information contained in the record; or modifies the record to make the personal identifying information unreadable; or takes actions consistent with commonly accepted industry practices to ensure that no unauthorized person will have access to the personal identifying information contained in the record. For more information on handling private information, view  document.
      • Records or reports containing SSNs or other confidential information will not be downloaded or stored on College or personal computers or other electronic devices that are not secured against unauthorized access. Devices storing SSN or confidential information must be encrypted.
      • Social Security Numbers will be released by the College to entities outside the College only as allowed by law, when the individual grants permission, when the external entity is acting as the College鈥檚 contractor or agent and adequate security measures are in place to prevent unauthorized dissemination to third parties or when Legal Counsel has approved the release.
      • Social Security Number breaches must be immediately reported to the Chair of the Information Security Program Team directly or by completing the .

Compliance

An employee or student who has substantially breached the confidentiality of Social Security Numbers will be subject to disciplinary action or sanctions up to and including discharge and dismissal in accordance with College policy and procedures.

Violation may also result in criminal prosecution. It is a felony, punishable by up to 5 years in prison, to compel a person to provide a Social Security Number in violation of Federal Law.

Every 3 years

01-14-2022 Susan E. Chichester CIO & Director, CIT 02-01-2017 ]]>
Mon, 30 Sep 2019 15:24:35 +0000 Anonymous 87341 at