Skip to Main Content
Skidmore College
Information Technology

IT Policies & Procedures
Acceptable Use of Technology

May 28, 2014 (Revised 2/15/2017)

The framework on which this work is based was provided in part by the Cornell University IT Policy Office and its director, Tracy Mitrano, and is gratefully acknowledged.

Document Statement Principles Reason for DocumentEntities Affected  |  Who Should Read  |  Reporting Alleged Violations  |  Contacts  |  Related Documents



Document Statement

Skidmore College owns and operates its electronic data infrastructure, which it must manage for the entire college community, in a manner that preserves a level of privacy and confidentiality while in accordance with relevant local state and federal laws, regulations and college policy. Any of the functions/authority/responsibility assigned to a particular position in this document may be completed by the person holding that position “or his/her designee” if said person is unavailable.

Principles

The computing facilities at Skidmore College are intended as a resource for all members of the college community. While IT encourages users to explore the versatility and power of the computing environment, users must:

  • Use only those computing and information technology resources for which they have authorization.
  • Protect the access to and integrity of computing, data and information technology resources. Ensure that sensitive data created, collected, maintained, used, disseminated and destroyed in a manner that prevents unauthorized use, corruption, disclosure, loss or theft.
  • Abide by all applicable local, state and federal laws and college policies.
  • Respect the copyrights and intellectual property rights of others, including the legal use of copyrighted software.
  • Use computing, data and information technology resources only for their intended purpose.
  • Respect the privacy and personal rights of others.
  • Refrain from any use that results in personal financial gain.
  • Never store or tansmit any payment card information (PCI) through end-user messaging technologies or through the Campus' wireless (Wi-Fi) network.

Reason for the Document

To protect the Skidmore community and Skidmore-managed computer systems from inappropriate use and to comply with relevant state and federal regulations and laws and college policies.

Entities Affected by this Document

All entities of the college.

Who Should Read this Document?

All members of the college community.

Reporting Alleged Violations

Violations of this policy can be reported to (in writing) and will be governed by the respective area’s disciplinary channels.

  • For faculty: The Vice President of Academic Affairs (VPAA) and Dean of the Faculty (DoF).
  • For staff: The Office of Human Resources.
  • For students: The Student Conduct Officer.

Violations of this policy may also be reported (in writing) to the appropriate individual as detailed in Table 1. Alternatively, you may also contact your supervisor, or a member of the President’s Cabinet.

Contacts

Direct any general questions about the college's acceptable-use policy to your department chair or director. If you have questions about specific issues, call the offices listed in Table 1.

Table 1

 

Subject

Contact

Telephone

Email/website

Document clarification and interpretation

William J. Duffy

Chief Technology Officer, Information Technology

518-580-5913

bduffy@skidmore.edu

IT Policies and Procedures

Policy Violations

Staff

Barbara Beck
Associate Vice President for Finance and Administration and Director of Human Resources

518-580-5809

bbeck@skidmore.edu

General William J. Duffy
Chief Technology Officer
518-580-5913 bduffy@skidmore.edu
Faculty Beau Breslin
VPAA and Dean of the Faculty
518-580-5705  bbreslin@skidmore.edu
Students Erin Dagle 
Assistant Director of Student Conduct and Conflict Resolution
518-580-5782  edagle@skidmore.edu

Related Documents