Print Friendly

POL 2.250 Internet Account Administration

Kirtland requires all members of its community to use electronic communications in a manner that is respectful to others. This Internet Account Administration policy was designed to protect users’ privacy, to protect the System or Network Administrator (SNA) in the performance of his or her job, to allow routine administrative actions that might affect users’ files, to provide a mechanism to allow non-routine, non-emergency access to users’ files, and to provide guidelines for the occasional need to take immediate action.

While respecting users’ confidentiality and privacy, Kirtland reserves the right to examine all computer files, subject to the requirements set forth in this policy.

Kirtland may restrict the use of its computers and network systems for electronic communications when faced with evidence of violation of college policies or federal, state, or local laws.

Kirtland reserves the right to limit access to its networks through college-owned or other computers, and to remove or limit access to material posted on college-owned computers.

Kirtland College and users recognize that all members of the college community are bound by federal and local laws relating to civil rights, harassment, copyright, security and other statutes relating to electronic media. It should be understood that this policy does not preclude enforcement of applicable laws and regulations of the United States of America.

PRO 2.250 INTERNET ACCOUNT ADMINISTRATION

The ability of a System or Network Administrator (SNA) to read a users’ files does not imply that he or she may do so without obtaining the approval required by these procedures.

  1. Routine Operations
    1. During the routine administration, SNA’s may need to archive or delete user files or messages from the system; for example, due to physical data storage limits or an individual’s departure from the college.
    2. Given that these situations are foreseeable, each organization responsible for a computer or network system on which these actions will take place must define how and when they will occur.
    3. Reasonable efforts must then be made to ensure that system users understand the policy.
  2. Misuse Situations
    1. Non-routine, non-technical emergency situations may occur where it is necessary to examine a user’s files without being able to obtain his/her specific permission or authorization. Typically, there will be no threat to the operations or security of the computer or network system.
    2. These procedures separate the authority to read user files or messages from the technical ability to do so, protecting both the user and the SNA.
      1. An administrator with cause wishing to obtain access to user files or messages not their own must send a written request to the dean of institutional services (DIS) or previously designated representative responsible for the system wherein those files or messages reside. The reason(s) must be clearly stated.
      2. The DIS or designee will evaluate the request and make a recommendation. If the recommendation is that the user’s files be accessed, the DIS or designee will forward that recommendation, with the original request, to the appropriate administrator. Requests from the above named administrators will be approved by the President. The administrator and DIS may delegate authority to act under this paragraph.
      3. If the President approves the request, the cognizant DIS or designee will authorize an SNA to access the user’s files. A complete report will be made and distributed within one (1) business day as follows:
        1. to the user,
        2. the original requester, and
        3. the appropriate college official(s)
  3. Technical Emergency Situations
    1. Situations will occur that pose immediate threats to the operations of security of computer or network systems. Because of the immediacy, the SNA will need to intervene without obtaining the written permission usually required before taking actions that may affect user files, messages or system access privileges.
    2. These procedures allow SNA’s to take appropriate, timely action when protecting college computer systems while ensuring that the user and appropriate college officials will be made aware of the situation as soon as possible.
      1. If a SNA determines that user files or messages pose a significant threat to the operation of security of a college computer or network system, he or she will take appropriate action to correct the problem. Additionally, the SNA may temporarily restrict the user’s access to that computer or network system. The SNA will not perform any action on user files or messages that are not relevant to the current problem and will not take any technical action, at this point, that would permanently deprive the user of access to the computer or network system.
      2. If possible, the SNA should consult with his/her supervisor prior to taking action. As soon as possible after action is taken, but no later than within (1) one business day, the SNA will make a written report to his or her immediate supervisor outlining the nature of the situation, including, but not limited to: the nature of the threat; protective actions taken; the user(s) involved; the user files or messages that were affected.
      3. After appropriate review, the SNA’s supervisor will forward the report, along with any recommendations, to the administrator responsible for the affected system.
      4. After appropriate review, the DIS , or previously designated representative, will evaluate the situation. The DIS will forward a report of the situation to the appropriate office as outlined below.  The DIS, in consultation with the cognizant SNA, will make a further determination as to whether a temporary restriction on the user’s access is appropriate.
  4. Unresolved Violations
    1. Incidents that are not resolved by the DIS, or designee, responsible for the affected system and are considered to be policy violations will be handled as follows:
      1. Policy violations by students will be handled in accordance with the Student Code of Conduct and referred to the director of student services.
      2. Policy violations by faculty or staff will be treated as academic matters and will be referred to the appropriate academic official and/or appropriate vice president (operations or instruction).
      3. Policy violations by college employees who are not faculty will be referred to the head of that employee’s department.
      4. Individuals who do not fit any of the above categories, i.e. “faculty,” “staff,” “student,” or “college employee” shall be dealt with in a manner which is congruous with the guidelines and due process of Kirtland Community College by the President or other duly designated administrator.

Approved September 11, 1998