Information Technology Appropriate Use Policy

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

This Policy applies to all Users of IT Systems, including but not limited to St Jude School students. It applies to the use of all IT Systems. These include computer systems, networks, and facilities administered by IT, as well as those administered by individual schools, departments, and other school-based entities.

Use of IT Systems, even when carried out on a privately owned computer or other device that is not owned, managed or maintained by the School of St Jude, is governed by this Policy once it used in the school environments.

Policy Statement

The purpose of this Policy is to ensure an information technology infrastructure that promotes the basic missions of the school in teaching, learning, research, and administration. In particular, this Policy aims to promote the following goals:

To ensure the integrity, reliability, availability, and superior performance of IT Systems;

To ensure that use of IT Systems is consistent with the principles and values that govern use of other School facilities and services;

To ensure that IT Systems are used for their intended purposes; and

To establish processes for addressing policy violations and sanctions for violators.

Reason for the Policy

Information technology ("IT"), is used daily to create, access, examine, store, and distribute material in multiple media and formats. Information technology plays an integral part in the fulfillment of the School of St Jude research, education, administration, and other roles. Users of St Jude IT resources have a responsibility not to abuse those resources and to respect the rights of the members of the community as well as the School itself. This School of St Jude IT Appropriate Use Policy (the "Policy" or "AUP") provides guidelines for the appropriate use of St Jude IT resources as well as for the School access to information about and oversight of these resources.

School policies that govern freedom of expression and related matters in other contexts also govern electronic expression. This Policy addresses circumstances that are particular to the IT arena and is intended to augment but not to supersede other relevant School policies. For statements of other applicable School policies, consult the School Administrations. The policies of St Jude's Department of Information Technology Services ("ITS") govern the use of St Jude IT Systems, and individual departments and schools at St Jude may have specific IT policies that elaborate on ITS’s basic policies.

Definitions

IT Systems: These are the servers, personal computing devices, applications, printers, networks (virtual, wired and wireless), online and offline storage media and related equipment, software, and data files that are owned, managed, or maintained by St Jude School. For example, IT Systems include departmental information systems, computer workstations and laptops, the School's campus network, and computer clusters.

User: A "User" is any person, whether authorized or not, who makes any use of any IT System from any location. Systems Authority: While St Jude School is the legal owner or operator of all IT Systems, its delegates oversight

Of particular systems of the head of a specific subdivision, department, or office of the School ("Systems Authority")

IT Manager : is responsible for strategic direction and planning, as well as technical leadership   

Systems Administrator: Systems Authorities may designate another person as "Systems Administrator" to manage the particular system assigned to him or her. Systems Administrators oversee the day-to-day operation of the system and are authorized to determine who is permitted access to particular IT resources.

Certifying Authority: This is the Systems Administrator or other School authority who certifies the appropriateness of an official School document for electronic publication in the course of School business.

Specific Authorization: This means documented permission provided by the applicable Systems Administrator.

Policy Sections 1. Appropriate use of IT Systems Although this Policy sets forth the general parameters of appropriate use of IT Systems, students, and staff should consult school or departmental governing policies for more detailed statements on permitted use of their various roles within the community. In the event of conflict between IT policies, this Appropriate Use Policy will prevail.

A. Appropriate Use IT Systems may be used only for their authorized purposes -- that is, to support the education, administration, and other functions of St Jude School. The particular purposes of any IT System as well as the nature and scope of authorized, incidental personal use may vary according to the duties and responsibilities of the User. Appropriate use restrictions extend to Users connecting to St Jude IT Systems with devices not owned by St Jude.

B. Authorization authorized Users are entitled to access only those elements of IT Systems that are consistent with their Specific Authorization. Upon request by a Systems Administrator or other School authority, Users must produce valid School identification.

C. Specific Proscriptions on Use The following categories of use are and prohibited:

1) Use that impedes, interferes with, impairs, or otherwise causes harm to the activities of others. Users must not deny or interfere with or attempt to deny or interfere with service to other Users in any way. Knowing or reckless distribution of unwanted mail or other unwanted messages are prohibited. Other behavior that may cause excessive network traffic or computing load is also prohibited.

2) A use that is inconsistent with St Jude's non-profit status. The School is a non-profit, tax exempt organization and, as such, is subject to specific federal, state, and local laws regarding sources of income, political activities, use of property, and similar matters. As a result, commercial use of IT Systems for non-St Jude purposes are generally prohibited, except if specifically authorized and permitted under School conflict-of-interest, outside employment, and other related policies. Prohibited commercial use does not include communications and exchange of data that furthers the School's educational, administrative and other roles, regardless of whether it has an incidental financial or other benefit to an external organization.

3) Use that suggests School endorsement of any political candidate or ballot initiative. Users must refrain from using IT Systems for the purpose of lobbying that connotes School involvement, except for authorized lobbying through or in consultation with the School's Office of the General Counsel.

4) Harassing or threatening use. This category includes, for example, display of offensive, sexual material in the workplace and repeated unwelcome contacts with another.

5) Use damaging the integrity of School IT Systems or non-St Jude systems. This category includes, but is not limited to, the following activities:

a) Attempts to defeat system security. b) Unauthorized access or use. The School recognizes the importance of preserving

the privacy of Users and data stored in IT systems. Users must honor this principle by neither seeking to obtain unauthorized access to IT Systems, nor permitting or assisting any others in doing the same. For example, a non-St Jude organization or individual may not use non-public IT Systems without specific authorization; Users are prohibited from accessing or attempting to access data on IT Systems that they are not authorized to access; Users must not make or attempt to make any deliberate, unauthorized changes to data on an IT System; and Users must not intercept or attempt to intercept or access data communications not intended for them.

c) Disguised or impersonated use.

d) Distributing computer viruses or malicious code. e) Unauthorized modification or removal of data or equipment.

6) Use in violation of law. This includes, but is not limited to, fraud, threats, harassment, and copyright infringement. With respect to copyright infringement, Users should be aware that copyright law governs (among other activities) the copying, display, and use of software and other works in digital form (text, sound, images, and other multimedia). The law permits use of copyrighted material without authorization from the copyright holder for some educational purposes (protecting certain classroom practices and "fair use," for example), but an educational purpose does not automatically mean that the use is permitted without authorization.

7) Use in violation of School contracts. All use of IT Systems must be consistent with the School's contractual obligations, including limitations defined in software and other licensing agreements;

8) Use in violation of School policy.

9) Use in violation of external data network policies.

D. Free Inquiry and Expression Users of IT Systems may exercise rights of free inquiry and expression

E. Personal Account Responsibility Users are responsible for maintaining the security of their own IT Systems accounts and passwords and may not share passwords without the authorization of the System Administrator Users are presumed to be responsible for any activity carried out under their IT Systems accounts or posted on their personal web pages.

A staff member may only encrypt data with the permission of his or her supervisor or as required by St Jude policy. All St Jude employees who use IT Systems to store, access, transmit or receive electronic protected financial and health information must encrypt that information Other Users are encouraged to encrypt data for protection against inadvertent or unauthorized disclosure while in storage or in transit over data networks, but they should do so using endorsed software and protocols.

G. Responsibility for Content Official School information may be published in a variety of electronic forms. The Certifying Authority under whose auspices the information is published is responsible for the content of the published document. Users also are able to publish information on IT Systems or over St Jude's networks. Neither St Jude nor individual Systems Administrators can screen such privately published material nor can they ensure its accuracy or assume any responsibility for its content. The School will treat any electronic publication provided on or over IT Systems that lacks a Certifying Authority as the private speech of an individual User.

2 Conditions for School Access The School places a high value on privacy and recognizes its critical importance in an academic setting. There are nonetheless circumstances in which, following carefully prescribed processes, the School may determine that other considerations outweigh the value of a User's expectation of privacy and warrant School access to relevant IT Systems without the consent of the User. Those circumstances are discussed below, together with the procedural safeguards established to ensure access is gained only when appropriate.

A. Conditions In accordance with Tanzania law, the School may access all aspects of St Jude IT Systems including devices not owned by St Jude but connected to St Jude IT Systems without the consent of the User, in the following circumstances:

1. When necessary to identify or diagnose systems or security vulnerabilities and problems, or otherwise preserve the integrity of the IT Systems; or 2. When required by Tanzania Government; or 3. When such access to IT Systems is required to carry out essential business functions of the

School; or

4. When required to preserve public health and safe

5. When there are reasonable grounds to believe that a violation of law or a significant breach of

School policy may have taken place and access and inspection or monitoring may produce evidence

related to the misconduct; or

6. For Users who were members of the St Jude staff: When the User’s employment at St Jude has ended and there is a legitimate security reason to access the User’s IT Systems

B. Process. Consistent with the privacy interests of Users, School access without the consent of the User pursuant to 2 A (1) through (5) will occur only with the approval of the School Management (for staff users), and the HOD (For Student)

respective delegates, except when emergency access is necessary to preserve the integrity of facilities or to preserve public health and safety. The School, through the Systems Administrators, will log all instances of access without consent pursuant to 2 A (1) through (5). Systems Administrators will also log any emergency access within their control for subsequent review by the School Management of St Jude. A User will be notified of School access to relevant IT Systems without consent pursuant to 2A (1) through (4). Depending on the circumstances, such notification will occur before, during, or after the access, at the School's discretion. In the case of a former staff member, access without consent pursuant to 2 A (6) must be approved by one of the former staff member’s supervisors or their successors and no logging or notice is required. In the case of a former student member, access without consent pursuant to 2 A (6) must be approved by the department chair and no logging or notice is required.

C. User access deactivations In addition to accessing IT Systems, the School, through the appropriate Systems Administrator, may deactivate a User's IT privileges, whether or not the User is suspected of any violation of this Policy, when necessary to preserve the integrity of facilities, user services, or data. The Systems Administrator will attempt to notify the User of any such action.

D. Use of security scanning systems By attaching privately owned personal computers or other IT resources to the School's network, Users consent to School use of scanning programs for security purposes of those resources while attached to the network.

E. Logs Most IT systems routinely log user actions in order to facilitate recovery from system malfunctions and for other management purposes. All Systems Administrators are required to establish and post policies and procedures concerning logging of User actions, including the extent of individually-identifiable data collection, data security, and data retention.

3. Enforcement Procedures

A. Complaints of Alleged Violations An individual who believes that he or she has been harmed by an alleged violation of this Policy may file a complaint in accordance with established School Grievance Procedures for staff (including, where relevant, those procedures for filing complaints of sexual harassment or of racial or ethnic harassment). The individual is also encouraged to report the alleged violation to the Systems Authority overseeing the facility most directly involved, or to the School Information Technology Office, which must investigate the allegation and (if appropriate) refer the matter to School disciplinary and/or law enforcement authorities.

B. Reporting Observed Violations If an individual has observed or otherwise is aware of a violation of this Policy, but has not been harmed by the alleged violation, he or she may report any evidence to the Systems Authority overseeing the facility most directly involved, or to the School Information Technology Office, which must investigate the allegation and (if appropriate) refer the matter to School disciplinary and/or law enforcement authorities.

C. Disciplinary Procedures Alleged violations of this Policy will be pursued in accordance with the appropriate disciplinary procedures for staff, and students, as outlined in the relevant policy documents. Staff members who are members of School-recognized bargaining units will be disciplined for violations of this Policy in accordance with the relevant disciplinary provisions set forth in the agreements covering their bargaining units.

Systems Administrators and the Information Technology Office may participate in the disciplinary proceedings as deemed appropriate by the relevant disciplinary authority. Moreover, at the direction of the appropriate disciplinary authority, Systems Administrators and the Information Technology Office are authorized to investigate alleged violations.

D. Penalties Individuals found to have violated this Policy may be subject to penalties provided for in other School policies dealing with the underlying conduct. Violators may also face IT-specific penalties, including temporary or permanent reduction or elimination of some or all IT privileges. The appropriate penalties shall be determined by the applicable disciplinary authority in consultation with the Systems Administrator.

E. Legal Liability for Unlawful Use In addition to School discipline, Users may be subject to criminal prosecution, civil liability, or both for unlawful use of an IT System.

F. Appeals. Users found in violation of this Policy may appeal or request reconsideration of any imposed

4. Policy Development

This Policy may be periodically reviewed and modified by the Leader of the School, who may consult with relevant School committees, students, and staff.

Contact details

PO Box 11875, Arusha, Tanzania, East Africa

Office hours:                       +255 686 049 142 or +255 755 106 058

Emergency:                        +255 756 367 323 or +255 756 236 330

Revision History

12/18/2012, 1/9/2013, 2/1/2013 (reformatting only),



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now