IT Acceptable Use Policy
What you may and may not do when you use the Seminary’s computing, internet, and communication resources, and the consequences of breaking the rules.
In support of the Seminary’s mission, Fuller makes available information, computing, telephone, and network resources appropriate for the work tasks of its students, staff and faculty. These resources are a revocable privilege, not a right of employment, admission, or official association with the Seminary. Administration and support of these resources is shared between Information Technology Services (ITS), and Auxiliary Services (AUXS), with direction from the Chief Technology Officer (CTO) and the Chief Financial Officer (CFO).
Use of the overarching technology resources of the Seminary is governed by local, state, and federal laws, as well as the community standards of the Seminary. It is each student and employee’s responsibility to know and comply with the acceptable use of technology resources, as well as governing laws, at all times.
Fuller reserves the right to monitor communication and activity of these resources without prior consent and/or notification.
The following represents a guide to technology use best practices. It does not identify all acceptable and unacceptable uses of technology at the Seminary, but serves as a starting point for understanding appropriate ways to interact with Fuller’s technology resources.
- Technology resources are to be used primarily for conducting and supporting the business and educational goals of Fuller Theological Seminary. This includes education, administration, and any professional activities relevant to the Seminary.
- Seminary-wide communication is to be approved by the appropriate senior manager or student group supervisor, and distributed in consultation with the Human Resources, Registrar, Student Engagement & Success, and/or Communications and Marketing department(s), as necessary.
- Acceptable use always includes respect for the rights and privacy of others, including but not limited to the intellectual property rights legally protected by copyright and licensing agreements.
- Respect for the integrity of all communication resources and channels, as well as respect for the Fuller brand, is at the foundation of acceptable use.
- Seminary computing resources are not intended for extensive personal use. For example, using Seminary-owned equipment for personal data storage, or any other non-Seminary related function should be kept to a minimum and should be incidental to the primary purposes of promoting education and learning and/or carrying out the administrative functions of the seminary.
- Use of seminary resources for illegal transmission of data, professional gain, personal monetary gain, or damage or slander of another person is not acceptable.
- Seminary information should never be stored on non-Seminary owned or administered technology, including but not limited to external drives, cloud-based storage, or non-Seminary administered email accounts.
- Use of peer-to-peer (P2P) applications or services is strictly prohibited on any of Fuller’s networks (administrative, student, and guest).
- Personally identifiable information (PII) and copyrighted information must be stored and transmitted with appropriate permissions and in accordance with all applicable laws. Never share or store information without express permission from the owner of the data. Email communication is inherently insecure and should never be used to transmit sensitive data.
- Any attempt to damage, intercept, or disrupt the technology infrastructure of the Seminary, even if unsuccessful, is unacceptable. This includes, but is not limited to interfering with the voicemail system, uninstalling or disabling anti-virus software, physical destruction of hardware, creating an unusually high volume of traffic across the network, or attempting to gain access to systems without appropriate permissions.
- Communicating on behalf of Fuller without permission to do so, misrepresenting the Seminary, plagiarizing, or communicating in a way that violates community standards or any other policy are all unacceptable uses of technological resources.
Best Practices for Responsible Computing
By using Seminary resources, you are agreeing to accept responsibility for your behavior while engaging with the available resources. The following best practices represent the foundation for responsible use.
- Remember to secure your physical space, as well as the technology in that space. Lock all doors, lock file cabinets, and secure all removable technology before leaving any space unattended.
- Secure your identity. Be sure to create complex passwords, change passwords when you suspect they have been compromised, and never share your credentials with anyone.
- Think before you click on any links in unsolicited email. Never give your password to anyone via email or through a channel you do not recognize. When in doubt, contact Tech Support before responding to unexpected online requests, or if anything appears out of the ordinary with your Seminary provided technology resources.
- Only use and retain the information needed for your work or student tasks, and nothing more. Keep sensitive information in systems of record, such as Banner, whenever possible. Be sure to keep sensitive information in appropriate file shares, systems, and files, not locally on your computer desktop or in email inboxes. Regularly empty your trash and downloads folders at least once a month.
- Maintain the security of PII in your possession. Never transmit information to others without explicit permission. Refrain from emailing PII or removing it from central records.
Consequences of Misuse
Misuse of seminary computing, network, and/or communication resources may result in one or more of the following consequences which may be implemented at the discretion of the CTO, CFO, or Provost:
- A written warning.
- A restriction on use privileges.
- A revocation of all use privileges.
- Implementation of the Seminary’s procedures for responding to alleged violations of community standards which could result in suspension or expulsion from the Seminary and/or termination of employment by the Seminary.
- Immediate suspension or termination from employment by the Seminary.
- Financial restitution to the Seminary for funds owed and/or expended because of misuse.
- Referral to civil authorities for prosecution.
Important Notes for Technology Use
- All Seminary-provided hardware, software, networking, and communication channels are the property of the Seminary. These technological resources and data can be monitored and/ or disclosed at any time. Seminary provided password-protected systems do not guarantee confidentiality.
- Email communication and affiliated accounts are the property of Fuller Theological Seminary. All staff email communication is retained in accordance with federal and state law.
- Some information available over the internet contains objectionable content. The Seminary does not assume responsibility for, nor endorse, the content of internet resources over which the Seminary has no control.
Technological advances can necessitate changes in policy, therefore the Seminary reserves the right to change this policy at any time, without advance notice. Users are encouraged to review the policies on The Student Handbook and The Employee Site for the latest updates. Questions related to these, and any technology policies, can be directed to the office of the CTO (email@example.com).