Computer Access Agreement

The purpose of this policy is to establish appropriate use of client accounts and the College’s computing equipment. The College of New Jersey computer systems and network are provided to support the mission of the College. As a provider of network and computing services to the campus, the College has an obligation to establish regulations for its use in order to benefit the entire community. Computer clients do not own accounts on College computers, but are granted the privilege of exclusive use of an account. At all times, clients using the College’s network and accounts must adhere to legal standards and the ethical and moral standards of the College. Failure to comply with acceptable standards may result in a suspension or revocation of privileges.

DEFINITIONS

For the purposes of this document, the following definitions will apply:

Access – includes wired, wireless, VPN, or mobile electronic connection methods [for the purposes of accessing resources] on or off campus.

Account – includes accounts issued via the HR, Student, or IDM systems, or any account issued for access to a third party system

Client – An individual who interacts with a computer to perform processes that yield results, commonly referred to as “client” or “end user”. This includes faculty, staff, students, TCNJ affiliates and authorized guests of the College

Malware – Short for malicious software. Common examples include viruses, ransomware, spyware, adware or rootkits. Category of applications that operate usually invisibly on a computer without informed client consent, to:

Network Access – Access to electronic resources hosted or provided by TCNJ or using TCNJ resources as a transport for access to other networks.

Network Access Device: Device used to connect a computer to a network. Common types include wireless access points and wired switches.

Status – may include active, inactive, locked, discontinued, alumni and emeriti

POLICY

Eligibility for Accounts and Network Access

Clients may use the College computer systems and networks to which they have been granted access for purposes of research, education or College administration. Accounts and access are granted based on each individual’s status and role at the College.

Privacy of Computer and Network Client Information

Information Technology will do its due diligence in taking every precaution possible to protect and secure data. Data security is a partnership between the client and Information Technology. The same security standards that apply to paper files should be applied to electronic files. Each client is responsible for maintaining a level of confidentiality in accordance with their role at the College. It should be noted that there are no facilities provided by the College systems for sending and receiving confidential messages and/or files and there should be no expectation of data privacy when using the College’s network.

The College does not monitor transmissions for the purpose of censorship, but may monitor transmissions should a violation of these regulations be alleged. Authorized personnel within Information Technology may also monitor transmissions in the course of performing routine maintenance or troubleshooting network or account problems.

System administrators may examine or make copies of files that are suspected of misuse or that have been corrupted or damaged. Client files may be subject to search by law enforcement agencies under court order if such files contain information which may be used as evidence in a court of law. Information Technology professional staff may access college-owned computers to perform system maintenance either on-site or using remote tools as necessary without prior notification.

Unacceptable Conduct

All existing policies and regulations of the College which govern student, faculty and staff conduct, including but not limited to the Student and Employee Handbooks, are hereby incorporated into this Client Computing Usage Policy and shall govern the conduct of students, faculty and staff who use The College’s network and computing services.

Following is a list of unacceptable conduct. This list includes, but is not limited to:

Compliance:

Network and Internet Access:

Data Protection/Privacy:

Enforcement

It is essential for each client of the network to recognize the responsibilities that accompany the privilege of having access to a vast array of resources. Clients are ultimately responsible for their own actions in accessing network services. The use of the network is a privilege which can be revoked at any time for abusive conduct without prior notice. Violators are subject to criminal prosecution and/or disciplinary action through the College student conduct structure or personnel hearing process.

Information Technology, Human Resources, Campus Police and Student Affairs enforce these policies as they relate to their areas of responsibility. Campus Police may involve other law enforcement agencies as necessary. In addition, the College department in which the violator is employed may be involved. Harassment or threats should be reported to Campus Police immediately. Other issues involving student violations of these guidelines should be reported to the Vice President of Student Affairs office. Any remaining issue should be directed to Information Technology and Human Resources. The College reserves the right to lock a computer account to preserve evidence under investigation without prior notice. The College also reserves the right to view files in client accounts, on backups or in transit on the network as is necessary to complete an investigation.

Client Responsibilities

Compliance:

Data Protection/Privacy:

Disclaimer

It is your responsibility to periodically review this document for changes and comply with the changes.

Copyright © 1996-2000, 2010, 2021 The College of New Jersey