Skip to main content
About Us

605 - Acceptable Use of Computers and Information Technology Resources

 

Responsible Office: Information Technology

Responsible Officer: Chief Information Officer 

References: 

 

PURPOSE:

Computer and information technology resources are essential tools in accomplishing the mission of Minnesota State College Southeast. These resources must be used and managed responsibly in order to ensure their availability and security. This policy establishes responsibilities for acceptable use of MSC Southeast information technology resources.

 

PART 1. POLICY 

Subpart A. Acceptable use  

System information technology resources are provided for use by currently enrolled system students, administrators, faculty, employees, and other authorized users. System information technology resources are the property of MSC Southeast, and are provided for the direct and indirect support of the system's educational, research, service, student and campus life activities, administrative and business purposes, within the limitation of available system technology, financial, and human resources. The use of MSC Southeast information technology is conditioned on adherence to this policy and any procedures or guidelines adopted pursuant to this policy. The system encourages the use of information technology as an effective and efficient tool within the framework of applicable state and federal laws, policies and rules and other necessary restrictions.

Subpart B. Academic freedom  

Nothing in this policy shall be interpreted to expand, diminish, or alter academic freedom articulated under Minnesota State Board policy and system collective bargaining agreements, or the terms of any charter establishing a system library as a community or public library.

Subpart C. Applicability  

This policy applies to all users of system information technology, whether or not the user is affiliated with MSC Southeast, and to all uses of system information technology, wherever located.

MSC Southeast is not responsible for any personal or unauthorized use of its system information technology or the security of personal data or devices on or using system information technology resources.

Subpart D. Definitions:

Security measures

Security measures means processes, software, and hardware used by system and network administrators to protect the confidentiality, integrity, and availability of the computer resources and data owned by the system or its authorized users. Security measures may include, but are not limited to, monitoring or reviewing individual user accounts for suspected policy violations and investigating security-related issues.

System

The Minnesota State Board of Trustees, the system office, the colleges and universities, and any part or combination thereof.

System information technology  

All system facilities, technologies, and information resources used for information processing, transfer, storage and communications. This includes, but is not limited to, computer hardware and software, computer labs, classroom technologies such as computer-based instructional management systems, and computing and electronic communications devices and services, such as modems, e-mail, networks or use of a network via a physical or wireless connection, telephones, voicemail, facsimile transmissions, video, mobile computing devices, and multimedia materials.

Transmit  

To send, store, collect, transfer, or otherwise alter or affect information technology resources or data contained therein.

User  

Any individual, including, but not limited to, students, administrators, faculty, employees, and volunteers using system information technology in any manner, whether or not the user is affiliated with MSC Southeast.

PART 2.  PROCEDURES

Acceptable Use of Computers and Information Technology Resources

Subpart A - Responsibilities of All Users. 

Compliance with applicable law and policy.

1.    Users must comply with laws and regulations, Minnesota State Board policies and system procedures, contracts, and licenses applicable to their particular uses. This includes, but is not limited to: the laws of libel, data privacy, copyright, trademark, gambling, obscenity, and child pornography; the federal Electronic Communications Privacy Act and the Computer Fraud and Abuse Act, which prohibit "hacking" and similar activities; state computer crime statutes; applicable conduct codes, including the System Procedure 1C.0.1, Employee Code of Conduct; applicable software licenses; and Board Policies 1B.1, prohibiting discrimination and harassment, 1C.2, prohibiting fraudulent or other dishonest acts; and 3.26, concerning intellectual property.

2.    Users are responsible for the content of their personal use of system information technology and may be subject to liability resulting from that use.

3.    Users must use only system information technology they are authorized to use and use them only in the manner and to the extent authorized. Ability to access information technology resources does not, by itself, imply authorization to do so.

4.    Users are responsible for use of system information technology under their authorization.

Unauthorized use

Users must abide by the security restrictions on all systems and information to which access is authorized.

1.    Users must not allow others who are not authorized to:

a.   use any account or password assigned by the system to anyone else;
b.    share any account or password, assigned to the user by the system, with any other individual, including family members;
c.     allow others to use system information technology under the user control.

2.    Users must not circumvent, attempt to circumvent, or assist another in circumventing security controls in place to protect the privacy and integrity of data stored on system information technology.

3.    Users must not change, conceal, or forge the identification of the person using system information technology, including, but not limited to, use of e-mail.

4.    Users must not knowingly download or install software onto system information technology unless allowed under applicable procedures or prior authorization has been received by the college Information Technology department.

5.    Users must not engage in activities that interfere with or disrupt network users, equipment or service; intentionally distribute viruses, worms, Trojans, or other malicious code; or install software or hardware that permits unauthorized access to system information technology.

6.    Users must not engage in inappropriate uses, including:

a.  Activities that violate state or federal law or regulation;
b.  Wagering or betting;
c.  Harassment, threats to or defamation of others, stalking, and/or illegal discrimination;
d.  Fund-raising, private business, or commercial activity, unless it is related to the mission of the system or its colleges and universities. Mission related activities are determined by the college, university, or system office, and include activities of authorized campus or system-sponsored organizations;
e.  Storage, display, transmission, or intentional or solicited receipt of material that is or may be reasonably regarded as obscene, sexually explicit, or pornographic, including any depiction, photograph, audio recording, video or written word, except as such access relates to the academic pursuits of a system student or professional activities of a system employee; and
f.   "Spamming" through widespread dissemination of unsolicited and unauthorized e-mail messages.

Protecting privacy. Users must not violate the privacy of other users and their accounts, regardless of whether those accounts are securely protected. Technical ability to access others' accounts does not, by itself, imply authorization to do so.

Limitations on use. Users must avoid excessive use of system information technology, including but not limited to network capacity. Excessive use means use that is disproportionate to that of other users, or is unrelated to academic or employment-related needs, or that interfere with other authorized uses. Colleges and universities may require users to limit or refrain from certain uses in accordance with this provision. The reasonableness of any specific use shall be determined by the college or university or system office in the context of relevant circumstances.

Unauthorized representations or trademark use. Users must not use system information technology to state or imply that they speak on behalf of the system or use system trademarks or logos without prior authorization. Affiliation with the system does not, by itself, imply authorization to speak on behalf of the system.

Subpart B. Employee Users. 

All employees of MSC Southeast are subject to Minnesota Statutes, §43A.38, the code of ethics for employees in the executive branch and System Procedure 1C.0.1, Employee Code of Conduct. In addition, employees are expected to use the traditional communication rules of reasonableness, respect, courtesy, and common sense when using system information technology.

Personal use.

1.    Personal use of system-owned cellular devices is governed by System Procedure 5.22.2 Cellular and Other Mobile Computing Devices.

2.    In accordance with Minnesota Statutes, §43A.38, subdivision 4, system employees may use system information technology for personal communications as long as the use is in accordance with state law, Minnesota State Board policy and system procedure, including system procedure 5.22.2, and the use, including the value of employee time spent, does not result in an incremental cost to the state, or results in an incremental cost that is so small as to make accounting for it unreasonable or administratively impracticable, as determined by the system.

Union activities. In the interest of maintaining effective labor-management relationships and efficient use of state time and resources, system e-mail accounts may be used by employee representatives of the union for certain union activities, in accordance with state policy and/or the provisions of applicable collective bargaining agreements.

System-owned property or services, including the e-mail system, may not be used for political activities, fund-raising, campaigning for union office, union organizing activities, or solicitation of employees for union membership.

Union use of system electronic communication technology, as authorized, is subject to the same conditions as employee use of such technology, as set forth in Policy 5.22 and this procedure, including security and privacy provisions.

Political activities. System employees shall not use system information technology for political activities prohibited by Minnesota Statutes, §43A.32 or §211B.09, or other applicable state or federal law.

Religious activities. System employees shall not use system information technology in a manner that creates the impression that the system supports any religious group or religion generally in violation of the Establishment Clause of the First Amendment of the United States Constitution or Article 1, Section 16 of the Minnesota State Constitution.

Subpart C - Security and Privacy. 

Security. Users shall employ reasonable physical and technological security measures to protect system records in all phases of handling. This may include, but is not limited to, the appropriate use of secure facsimiles or encryption or encoding devices when electronically transmitting data that is not public.

Privacy. Data transmitted via system information technology are not guaranteed to be private (Minnesota State Board Policy 5.23 - Security and Privacy of Information Resources). Deletion of a message or file may not fully eliminate the data from the system.

Right to employ security measures. The system reserves the right to employ security measures, including but not limited to, the right to monitor any use of system information technology, including those used in part for personal purposes. Users have no expectation of privacy for any use of system technology resources, except as provided under federal wiretap regulations (21 U.S.C. Sections 2701-2711).

The system does not routinely monitor individual usage of its information technology resources. Normal operation and maintenance of system information technology requires the backup and caching of data and communications, the logging of activity, the monitoring of general usage patterns and other activities that are necessary for such services. When violations are suspected, appropriate steps shall be taken to investigate and take corrective action or other actions as warranted. System officials may access data on system information technology, without notice, for other business purposes including, but not limited to, retrieving business-related information; re-routing or disposing of undeliverable mail; or responding to requests for information permitted by law.

Subpart D - Application of Government Records Laws. 

Data practices laws. Government data maintained on system information technology is subject to data practices laws, including the Minnesota Government Data Practices Act and the federal Family Educational Rights and Privacy Act, to the same extent as they would be if kept in any other medium. Users are responsible for handling government data to which they have access or control in accordance with applicable data practices laws.

Record retention schedules. Government data maintained on system information technology is subject to data practices laws, including the Minnesota Government Data Practices Act and the federal Family Educational Rights and Privacy Act, to the same extent as they would be if kept in any other medium. Users are responsible for handling government data to which they have access or control in accordance with applicable data practices laws. 

Subpart E – Compliance with Minnesota State system Policies & Procedures. 

MSC Southeast policy 605 and related procedures may not specify rules or procedures inconsistent with or against Minnesota State system policy 5.22 and related procedures or Minnesota state statutes.

Subpart F - Enforcement. 

Conduct that involves the use of system information technology resources to violate a system policy or procedure, or state or federal law, or to violate another's rights, is a

serious abuse subject to limitation or termination of user privileges and appropriate disciplinary action, legal action, or both.

Access Limitations. MSC Southeast reserves the right to temporarily restrict or prohibit use of its system information technology by any user without notice, if it is determined necessary for business purposes.

Repeat violations of copyright laws. MSC Southeast may permanently deny use of system information technology by any individual determined to be a repeat violator of copyright or other laws governing Internet use.

Disciplinary proceedings. Alleged violations shall be addressed through applicable system procedures, including but not limited to System Procedure 1B.1.1, to address allegations of illegal discrimination and harassment; student conduct code for other allegations against students; or the applicable collective bargaining agreement or personnel plan for other allegations involving employees. Continued use of system information technology is a privilege subject to limitation, modification, or termination.

Sanctions. Willful or intentional violations of this procedure are considered to be misconduct under applicable student and employee conduct standards. Users who violate this procedure may be denied access to system information technology and may be subject to other penalties and disciplinary action, both within and outside of the system. Discipline for violations of this procedure may include any action up to and including termination or expulsion.

Referral to Law Enforcement. Under appropriate circumstances, MSC Southeast may refer suspected violations of law to appropriate law enforcement authorities, and provide access to investigative or other data as permitted by law.

 

Approved:  June 17, 1997
Reviewed:  December 28, 2010; October 31, 2013; July 2020; May 10, 2023
Revised:   February 15, 2000; June 30, 2004; July 2020; May 10, 2023