IT Acceptable Use Policy
Current revision: June 26, 2024
Purpose
In support of Fuller Theological Seminary’s mission, the institution provides information, computing, internet, and communication resources to students, staff, and faculty. These resources are a revocable privilege, not a right. Their administration and support are overseen by Information Technology Services (ITS), under the direction of the Chief Technology Officer (CTO).
Compliance
Use of Fuller’s technology resources is governed by local, state, and federal laws, and the Seminary’s community standards. Each user is responsible for understanding and adhering to these guidelines at all times. The Seminary reserves the right to monitor communication and activity without prior consent or notification.
Acceptable Use
- Primary Use: Technology resources should primarily support Fuller’s educational and administrative goals.
- Communication: Seminary-wide communication must be approved and distributed through appropriate channels, in consultation with relevant departments.
- Respect: Users must respect the rights and privacy of others, including intellectual property rights protected by copyright and licensing agreements.
- Integrity: Users should maintain the integrity of all communication resources and respect the Fuller brand.
Unacceptable Use
- Personal Use: Extensive personal use of Seminary resources, such as personal data storage, should be minimized.
- Illegal Activities: Use of resources for illegal activities, professional or personal gain, or harming others is prohibited.
- Data Storage: Seminary information must not be stored on non-Seminary owned technology.
- Unauthorized Software: The use of unauthorized or insecure applications that may pose security risks, consume excessive bandwidth, or violate legal or copyright regulations is prohibited. This includes, but is not limited to, applications known for distributing malware or engaging in illegal file sharing (e.g. Peer-to-Peer applications).
- Sensitive Information: PII and copyrighted information must be stored and transmitted securely, and email should not be used for transmitting sensitive data.
- Disruption: Any attempt to damage, intercept, or disrupt the technology infrastructure is unacceptable.
- Misrepresentation: Unauthorized communication on behalf of Fuller, misrepresentation, and plagiarism are prohibited.
Best Practices for Responsible Computing
- Physical Security: Secure your physical space and technology. Lock doors and file cabinets and secure removable technology.
- Identity Security: Create complex passwords, change them if compromised, enable multi-factor authentication (where available), and never share credentials.
- Email Safety: Be cautious with unsolicited emails and never share passwords via email.
- Data Management: Use and retain only necessary information for your tasks. Keep sensitive information in appropriate systems, and regularly clean your storage.
- PII Security: Secure PII, avoid unauthorized transmission, and refrain from emailing sensitive information.
Consequences of Misuse
Misuse of resources may result in:
- Warnings: Written warnings for minor infractions.
- Restrictions: Restrictions or revocation of use privileges.
- Disciplinary Actions: Implementation of disciplinary procedures, which may include suspension or expulsion from the Seminary or termination of employment.
- Financial Restitution: Compensation for damages caused by misuse.
- Legal Action: Referral to civil authorities for prosecution.
Important Notes
- Monitoring: Seminary resources are subject to monitoring and disclosure.
- Email Retention: Email communication is retained as per federal and state law.
- Internet Content: The Seminary is not responsible for objectionable content accessed via the internet.
- Policy Changes: Policies may change due to technological advances. Users should review the latest updates on the Student and Employee Handbooks.
Review and Revisions:
This policy is subject to periodic review and revision to reflect changes in regulatory requirements, institutional needs, and technological advancements. Amendments to this policy must be approved by the CTO, and Fuller’s Office of Compliance & Risk Management.
Contact Information
Questions about this policy should be directed to the Chief Technology Officer at [email protected].