IT Policies & Procedures
Acceptable Use of Technology
May 28, 2014 (Revised 2/15/17)
The framework on which this work is based was provided in part by the Cornell University IT Policy Office and its Director Tracy Mitrano, and is gratefully acknowledged.
Document Statement | Principles | Reason for Document | Entities Affected | Who Should Read | Reporting Alleged Violations | Contacts | Related Documents
Skidmore College owns and operates its electronic data infrastructure, which it must manage for the entire college community, in a manner that preserves a level of privacy and confidentiality while in accordance with relevant local state and federal laws, regulations, and college policy. Any of the functions/authority/responsibility assigned to a particular position in this document may be completed by the person holding that position “or his/her designee” if said person is unavailable.
The computing facilities at Skidmore College are intended as a resource for all members of the college community. While IT encourages users to explore the versatility and power of the computing environment, users must:
- Use only those computing and information technology resources for which they have authorization.
- Protect the access to and integrity of computing, data, and information technology resources. Ensure that sensitive data created, collected, maintained, used, disseminated, and destroyed in a manner that prevents unauthorized use, corruption, disclosure, loss or theft.
- Abide by all applicable local, state, federal laws and college policies.
- Respect the copyrights and intellectual property rights of others, including the legal use of copyrighted software.
- Use computing, data, and information technology resources only for their intended purpose.
- Respect the privacy and personal rights of others.
- Refrain from any use that results in personal financial gain.
- Never store or tansmit any payment card information (PCI) through end-user messaging technologies or through the Campus' wireless (WI-FI) network.
To protect the Skidmore community and Skidmore managed computer systems from inappropriate use and to comply with relevant State and Federal regulations, laws, and college policies.
All entities of the college.
All members of the college community.
Violations of this policy can be reported to (in writing) and will be governed by the respective area’s disciplinary channels.
- For Faculty: The Vice President of Academic Affairs (VPAA) & Dean of the Faculty (DoF).
- For Staff: The Office of Human Resources.
- For Students: The Student Conduct Officer.
Violations of this policy may also be reported (in writing) to the appropriate individual as detailed in Table 1. Alternatively, you may also contact your supervisor, or a member of the President’s Cabinet.
Direct any general questions about the College Acceptable Use Policy to your Department Chair or Director. If you have questions about specific issues, call the offices listed in Table 1.
Document Clarification and Interpretation
William J. Duffy
Chief Technology Officer, Information Technology
|General||William J. Duffy
Chief Technology Officer
VPAA & Dean of the Faculty
Assistant Director of Student Conduct and Conflict Resolution
- Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. ¤ 1232g; 34 CFR Part 99)
- Financial Services Modernization Act of 1997 (Gramm-Leach-Billey Act)
- Health Insurance Portability and Accountability Act of 1996 (HIPAA)
- USA Patriot Act of 2001
- Skidmore College Faculty Handbook
- Skidmore College Employee Handbook
- Skidmore College Student Handbook