Technology Acceptable Use Policy

Technology Acceptable Use Policy

1.0 Purpose

Wheaton College’s technology infrastructure exists to support the organization and activities needed to fulfill the organization’s mission. Access to these resources is a privilege that should be exercised responsibly, ethically, and lawfully.

The purpose of this Technology Acceptable Use Policy is to clearly establish the College’s position relating to the acceptable use of its technology and the role each member of the organization has in protecting its information resources.

2.0 Scope

This policy applies to all users of technology resources owned, managed or otherwise provided by the organization. Individuals covered by this policy include, but are not limited to, all employees and service providers, students, guests and anyone else with access to the organization's technology and information resources and/or facilities. Technology and information resources include all Wheaton College-owned, licensed, or managed hardware and software, email domains, and related services and any use of the organization’s network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network.

3.0 Privacy and Property

Wheaton College will make every reasonable effort to respect a user's privacy. However, employees and other users as identified above have no expectation of privacy for communications, documents, or other data transmitted or stored on the organization’s resources. In addition, in response to a judicial order or any other action required by law or permitted by official Wheaton College policy or as otherwise considered reasonably necessary to protect or promote the legitimate interests of the organization, the College reserves the right to access, review, intercept, monitor, and/or disclose all data created, transmitted, accessed, and/or stored on the College’s network and/or technology. Examples of situations where the exercise of this authority would be warranted include, but are not limited to, the investigation of violations of law or the organization’s rules, regulations, or policy, or when access is considered necessary to conduct Wheaton College business due to the unexpected absence of an employee or to respond to health or safety emergencies.

The campus network is maintained and provided to assist in the pursuit of the mission of Wheaton College and to conduct the College's day-to-day operational activities. The network is College property thus all data composed and created by employees and transmitted and/or stored on the network, is and will remain College property, not the private property of any individual. Exceptions to the data ownership clause described includes: student works developed as a part of their academic or co-curricular pursuits; and scholarly work by faculty such as articles, books, music composition, research data, and the like.

Data residing on personally-owned workstations that are connected to the campus network is not considered to be College property, but any data created, transmitted, accessed, and/or stored on the campus network by users of these individually-owned computers is subject to the same policies, procedures, guidelines and constraints as data created, transmitted, accessed, and/or stored through the use of College-owned computers.

4.0 Policy

Activities related to Wheaton College’s mission take precedence over computing pursuits of a more personal or recreational nature. Personal, non-job-related use of the College’s technology, except for use by students enrolled at the College, should be incidental and kept to a minimum. Any use that materially disrupts the organization’s mission or its day-to-day operational activities is prohibited.
The same standards of common sense, courtesy, civility, and the College’s Statement of Faith and Community Covenant, that govern the use of other shared facilities, must be adhered to in regard to the use of information technology resources. This includes the individual’s right to privacy and to be free from intimidation, harassment, and unwarranted annoyance. All users of Wheaton College’s technology resources, whether use is via personally-owned and/or College-owned devices, must adhere to the requirements enumerated below.

4.1 Fraudulent and Illegal Use

Wheaton College explicitly prohibits the use of any information system for fraudulent and/or illegal purposes. While using any of the organization’s information systems, a user must not engage in any activity that is illegal under local, state, federal, and/or international law. As a part of this policy, users must not:

Wheaton College is a non-profit organization, and as such use of the College’s information systems for commercial purposes is prohibited.

Any user that suspects or is aware of the occurrence of any activity described in this section, or any other activity they believe may be fraudulent or illegal, must notify the Chief Information Officer immediately via cio@wheaton.edu.

4.2 Confidentiality

Wheaton College has both an ethical and legal responsibility to protect confidential information in accordance with its Data Classification Policy. Confidential data is defined as data that has been classified as “Restricted” or “Private” by the Data Classification Policy. To promote confidentiality users must not:

All encryption keys employed by users must be provided to the Chief Information Officer if requested, in order to perform functions required by this policy.

4.3 Harassment

See details and provisions of the College’s Discrimination, Harassment and Sexual Misconduct Policy.

4.4 Malicious Activity

Wheaton College strictly prohibits the use of its information systems for malicious activity against other users, the organization’s information systems themselves, or the information assets of other parties. Users must not:

4.5 Objectionable content

Wheaton College strictly prohibits the use of organizational information systems for accessing or distributing content that other users may find objectionable. Users must not post, upload, download, or display inappropriate messages, photos, images, sound files, text files, video files, newsletters, or related materials, including but not limited to those that are discriminating; harassing; sexually explicit; violent or promoting violence; and/or anything that would not uphold the values expressed in our Community Covenant.

4.6 Hardware and software

Wheaton College provides technology resources to employees and other personnel for the purpose of ensuring they have a safe and reliable computing environment from which to work. Thus, those who are working with or accessing institutional resources need to be sure that they are operating within the secure platforms that have been vetted and reasonably secured. As such:

4.7 Messaging

The organization provides a robust communication platform for users to fulfill its mission.

5.0 Enforcement

Users who violate this policy may be denied access to organizational resources and may be subject to penalties and disciplinary action both within and outside of Wheaton College. The organization may temporarily suspend or block access to an account or information systems prior to the initiation or completion of disciplinary procedures, when it reasonably appears necessary to do so in order to protect the integrity, security, or functionality of the organization or other technology resources or to protect Wheaton College from liability.

If any user creates any liability on behalf of Wheaton College due to use in a way that the user reasonably knew to be in violation of this policy, the user agrees to be fully responsible, and to be held accountable should it be necessary for Wheaton College to defend itself against the activities or actions of the user.

Users are subject to disciplinary rules described in the Student, Employee, or Faculty Handbooks and any other applicable policies and procedures.

6.0 Exceptions

Exceptions to the policy may be granted by the Chief Information Officer, or his or her designee. All exceptions must be reviewed annually.

Departments may create and enforce more restrictive security policy and processes to meet the business needs of the organization.

To request exceptions or authorizations contact the AIT Service Desk.

7.0 Effective date

Effective: October 1, 2017
Last updated: September 28, 2017

8.0 Revision History

VersionDateAuthorRevision
1.00 March 30, 2017 GreyCastle Security Original
1.01 September 29, 2017 Wheaton & GCS General Revision

Effective Date: October 1, 2017

Last Update: September 28, 2017

Responsible SAC Member: Vice President for Finance and Operations

Policy Owner: Chief Information Officer in partnership with Technology @ Wheaton Governance

Policy Contact: Dr. Alan Wolff, Chief Information Officer