Workplace Technologies Research Inc provides computing
and networking resources to employees. Use of these resources is a privilege
granted to employees use as a work tools only.
These policies, which apply to all users of WTRI's
computing and information resources, consist of the following elements:
General Use
Network Use Policy
Anti-Virus Software Policy
Administrative Systems Use Policy
Web Policy
Computing and Telecommunications staff members are available to answer
questions regarding computer and network use. Feel free to contact them at
822-2564 or sterling@WTRI.com.
Violations and Consequences
WTRI will take reasonable and necessary steps to preserve the security of its
computer and network resources. Doing so maintains a respectful community in
which our computing and information resources may be utilized as intended. Users
are expected to maintain this community by abiding by computing policies and
reporting violations of these policies immediately. Complaints of
potential policy violations should be reported to Computing and
Telecommunication Services, 822-2564 or e-mail to sterling@WTRI.com.
Violations of the Policy alleged to have been committed may be referred to
the your supervisor, the Director of Human Resources, or another appropriate
WTRI Officer.
Activities that in any way conflict with these policies can result in
sanctions, corresponding to the severity of the action and ranging from a
written reprimand to termination of employment and/or referral to the
appropriate legal authorities.
WTRI reserves the right to access electronic communication or data (e.g.,
email, computer files) as it deems necessary. While WTRI rarely does this,
at times it may be compelled to do so in the enforcement of WTRI policies and
ethics, or by an external law enforcement agency.
(top)
Workplace Technologies Research Inc employees, staff and interns are
responsible for legal and ethical use of computers and the network.
Activities considered to be in conflict with this policy include, but are not
limited to, the following:
- Spreading viruses or causing disruptions on the network.
- Unauthorized access to restricted computers, data, or programs.
- Sharing a password or account(s). Account holders are responsible and
will be held accountable for all activity occurring on their accounts.
- Creating, modifying, executing or re-transmitting any computer program
or instructions intended to gain unauthorized access to, or make
unauthorized use of, any computer facilities or software.
- Violating copyright laws or software license agreements.
- Installing software, including freeware, shareware, public-domain or
commercial software on any WTRI-owned computer equipment without appropriate
authority.
- Using computers or networks with the intent to compromise any other
computers or networks or to commit crimes or other unethical acts.
- Using computers or networks for unauthorized non-WTRI-related commercial
or for-profit activity.
- Sending or forwarding electronic mail for unauthorized purposes (i.e.,
spam). This includes but is not limited to unsolicited and unsanctioned
mass mailings. WTRI officials authorized to send or approve mass electronic
mailings are the President or Vice President.
- Viewing, printing, storage, display, or playing of sounds of any
sexually explicit or potentially offensive materials in a way that may
create an offensive working environment.
- Excessive use of paper, toner, disk space, or other resources.
- Monopolizing systems so that others are prevented from use.
- Overloading computers or networks with excessive data.
- Activities in violation of faculty and staff employment handbooks or
conduct policies.
- Using email or other electronic methods for purposes of harassment.
- Activities which violate local, state, or federal laws.
- Removing any WTRI owned computer software or hardware from the workplace
without written permission of the appropriate administrator.
(top)
This policy applies to all persons connecting
personally-owned computer systems to the Workplace Technologies Research Inc
network.
The WTRI network includes shared, finite resources
installed by WTRI to promote scholarship and learning for all students.
Disruption of the network will deprive others of access to important WTRI
resources.
Responsibilities for Personally Owned Computers
To
comply with the WTRI General Computer Use Policy (http://share.WTRI.com/wtri/index.html)
and WTRI Network Use Policy:
-
Maintain a valid, regularly updated anti-virus program.
-
Maintain effective security practices on the personally owned computer
system to avoid intentional or unintentional activities from or to any
network connection. Included, but not limited to, are attempts to monitor
other network connections, hijack connections, spread viruses, spyware, or
any other activity which may impact the overall security of the network.
-
Obtain authorization prior to operating a server on the WTRI network.
Contact Computing and Telecommunication Services for technical guidance and
restrictions.
WTRI's Responsibility
for the Network
WTRI
commits to:
(top)
This policy is in effect beginning July 2007.
Anyone who connects a personally owned computer to the WTRI network is required
to install and regularly update a reliable anti-virus program. The owner
is also responsible for the security of the personally owned computer.
Failure to assume responsibility for either security or anti-virus protection
can result in network interruptions since an unprotected computer is vulnerable
to intrusion by anyone in the world. Such intrusion is typically without
the owner's knowledge.
- WTRI will provide staff, interns and employees with anti-virus software
free of charge for personal computers used at work.
- This software subscription must be renewed each year. Instructions to
download and install the software are available from Computer and
Telecommunications Services.
- If the individual already has purchased a reliable anti-virus software
program, it must continue to be updated regularly.
Specific Consequences for Non-compliance with This Policy
1st Incident
- If a computer is found to contain a virus, the computer will be
temporarily removed from the network and the owner will be notified via
email and/or telephone.
- The computer will need to be “cleaned” prior to accessing the WTRI
network. If the user is able to clean the computer, the user will then need
to provide evidence of the cleaning prior to reconnection to the network.
- Interns may enlist the help of Computer and Telecommunications Services
to clean the computer.
- Employees and staff should consult Computer and Telecommunications
Services for direction.
2nd Incident
- If a second incident of a virus infection occurs, the computer will be
temporarily removed from the network and the owner will be notified via
email and/or telephone.
- The owner will be charged $50 before the computer can be reconnected to
the network. If the WTRI Computer and Telecommunications Services
determines that the infected machine had been infected even though
appropriate steps were taken to protect it, e.g., latest virus definitions
were on the computer, a charge would not apply.
- The computer will need to be “cleaned” prior to accessing the WTRI
network. If the user is able to clean the computer, the user will then need
to provide evidence of the cleaning prior to reconnection to the network.
- Interns may enlist the help of Computer and Telecommunications Services
to clean the computer.
- Employees and staff should consult Computer and Telecommunications
Services for direction.
3rd Incident
- If a third incident of a virus infection occurs, the computer will be
permanently removed from the WTRI network and the owner will be notified via
email and/or telephone.
(top)
Workplace Technologies
Research Inc’s administrative computing systems collect and store sensitive data
on employees, staff, interns and clients that is needed for the normal
operations of WTRI. WTRI employees, including interns, must assume
responsibility for legal and ethical computer, data, and network use. This
data may include but is not limited to:
- Personal
(non-public) information on interns, employees, or WTRI affiliates
- WTRI financial
information
- Other proprietary
WTRI information
Activities considered to
be in conflict with this policy include, but are not limited to, the following:
- Unauthorized change,
deletion, corruption, or removal of WTRI data from WTRI systems.
- Sharing or using this
information for any purpose other than WTRI business.
- Sharing directories
and/or files on your computer with others without appropriate authorization
or security measures.
- Distributing
information that violates WTRI FERPA Policy.
- Transport of
restricted or sensitive data via portable media (e.g., flash memory, laptop
computer, personal digital assistant) without prior authorization from a
WTRI vice president in coordination with Computer and Telecommunications
Services.
(top)
The WTRI web site contains
information for and about the WTRI community and is a major means of
communication, publication and collaboration in support of the mission of WTRI.
WTRI maintains the right to temporarily disable access to any Web page under
review for possible policy violations as well as web pages containing inaccurate
information reflecting upon the integrity of WTRI.
- Any member of the
WTRI community posting information on the web must abide by U.S. and
international copyright and licensing laws.
- Copyrighted material
reproduced on the web site must have prior written permission of the
copyright holder.
- All published
information will include identification of the owner, date modified or
created, and contact information.
- Commercial use of
WTRI web pages is prohibited.
- Owner(s) of published
information are responsible for the accuracy and maintenance of content.
WTRI is not responsible
for the content of individual home pages, links from these pages, or material
accessed via those links.