Acceptable Use of College Computing Resources Policy
This policy was posted for public comment from February 18 – March 5, 2025
Comments
|
The general use of this TOS is on the point and appropriate. I would love to see, as someone in the field of Cybersecurity, there be a clause to protect those exploring field-related tools to be allowed access to possibly isolated networks where Virtual Machines can live and allow for exploration there. We have been able to work with the IT department in the past but at highly restricted levels - no NAT allowed, for example, which severely limits these tools, like VMs, to the point where they hardly function. |
|
I would like more clarification on the final sentence in the definition of D. Incidental Personal Use. Could you clarify what "This does not include external personal business transactions." actually means? For instance, can I use my school laptop to make a purchase on Amazon? If you look at 4.c.2.a-c it looks as though making an online purchase is permitted, which seems to conflict with the last sentence of definition D. |
|
Section B2k, when combined with Sections M1-4, makes it challenging to protect personal and sensitive information during work hours because we use a college device or its network. While I understand that OIT's changes are intended to enhance security, they can feel restrictive from a regular user's perspective. For example, the implementation of Admin By Request significantly limits a user's control over their device. |
|
Item 2a may be problematic in that one could accidentally violate this policy by attempting to open a link to a restricted file. In this case, if you were navigating SharePoint and clicked on a restricted file, you could violate this policy as written without malicious intent. |
|
As it is currently written, 4.H.1. means, in a literal sense, (a) that all college business must be conducted through email or (b) (if read more narrowly to apply only to “college computing resources”) that email is the only computing resource that can be used for college business. It would be a violation of policy, therefore, to conduct business using RingCentral, SharePoint, Zoom, most apps within the Microsoft Office suite, etc. |
|
F.3 |
|
[F.3] It would also prevent many of us from doing things like grading papers from home or even teaching online courses from our home offices. |
|
1. Policy Statement |
Responses
General Comments
Thank you for your comment.
Thank you for your comment. The policy statement (section 1) clearly states that “SLCC faculty, staff, students, contractors, vendors, third-party agents, and community members who access [SLCC computing resources] must comply with this policy.”
The AI provisions in this policy were intentionally left broad to allow for future developments. The OIT Guidelines for AI Use at SLCC, hyperlinked in 4.N.8, will be updated with specifics as AI technology and use evolve.
As someone in the field of Cybersecurity, I’d like there to be a clause to protect those exploring field-related tools. I'd like them to be allowed access to possibly isolated networks where Virtual Machines can live and allow for exploration. We have been able to work with the IT department in the past, but at highly restricted levels—no NAT allowed, for example, which severely limits these tools, like VMs, to the point where they hardly function.
For requests of this nature, please follow the SLCC Technology Approval and Prioritization Process and submit a Technology Request Form. Section 4.F.2 now includes a hyperlink to the Technology Request Form.
3.D Incidental Personal Use Definition – Could you provide more clarity regarding the last sentence, “This does not include external personal business transactions.” For example, can I use my school laptop to make a purchase on Amazon? If you look at 4.C.2.a-c, it appears that making an online purchase is permitted, which seems to conflict with the last sentence of 3.D.
In the case of the example you provided, yes, this would be considered incidental personal use. “External personal business transactions” refers to the specifications in section 4.C.
4.B. User Responsibilities
4.B.1.e has hyperlinks to IT support and the Security Office. A hyperlink to the Public Safety Contact webpage has been added.
The word “intentionally” has been added at the beginning of 4.B.2.a. Users knowingly accessing a restricted document or asset are misusing computing resources.
OIT is responsible for the security of college-owned devices. Incidental personal use is permitted on college-owned devices; however, a college-owned device should not be used for storing personal information unrelated to college duties. Admin by Request intentionally limits a user’s control over a college device to enhance security.
4.C Incidental Personal Use
- Some faculty use their college-issued laptops to provide private tutoring lessons to students for which they are paid. There may be several Zoom lessons over the course of a semester for which they are paid $300 or $400.
- Some college faculty are paid to provide a virtual deposition as an expert witness in litigation. They provide their Zoom deposition on their college computer and are paid $500 or $1,000 for this service.
- Some college faculty conduct research and author articles on their laptops. In some cases, they are paid to write and publish these articles.
None of these examples violates the incidental personal use defined within this policy. An example that would violate the policy would be using a college-owned device to host and manage a personal website and/or leverage college internet bandwidth for hosting a personal business.
Section 4.C, Incidental Personal Use, aligns with the definition of incidental use in the Employee Conduct policy and the Intellectual Property policy.
Section 4.C.3 is intended to protect college resources from inappropriate personal use. If a user’s personal use is rescinded, OIT would then reach out to the applicable user for discussion. Employees do not have a recognized right to due process regarding computer access.
4.F Use of College Networks
4.F.3 has been revised to state, “From any public or unsecured networks, faculty and staff must use the college-provided VPN to access college resources.” The intent is to not use unsecured open public networks. A personal home network is not a public or open/unsecured network in this context. AllAccess is considered a VPN in this situation and is available to faculty, staff, and students.
4.H.1 is currently a bit broad. Suggest rewording as “Institutional business email communications must use the college’s enterprise email system,” “The college’s enterprise email system must be used to conduct college business,” or something similar.
Thank you for your comment. No changes were made.
Unless a user is forwarding their Canvas messages to a personal email, this is not an issue. Canvas messages are considered a college enterprise system.
4.J Use of Social Media
Thank you for your comment. This policy is concerned with prohibiting publishing information on social media that violates laws or acts such as FERPA, HIPAA, GRAMA, etc. That is the responsibility of every user. The differentiation between types of media accounts is not the purview of this policy.
If brought to the college’s attention, then appropriate action, potentially including corrective action, may be taken.
Yes, LinkedIn is considered social media for this policy.
4.L Use of Artificial Intelligence (AI)
The AI provisions in this policy were intentionally left broad to allow for future developments. The OIT Guidelines for AI Use at SLCC, hyperlinked in 4.N.8, will be updated with specifics as AI technology and use evolve.
Thank you for your comment. No changes were made.
4.L.5 has been revised to clarify that the concern is about how faculty and staff are individually using AI technologies for college business purposes (which includes teaching, research, and administration).
4.N Enforcement – who has the responsibility to enforce this policy’s provisions?
OIT, with the assistance of PWC, the Dean of Students, and Public Safety as appropriate.