This policy provides a framework for acceptable computer use within Barry University (hereinafter “University”). The University’s assets and information shall be used for the good of the University and in accordance with State and Federal laws and regulations. Any use not referenced in this policy as an acceptable use shall be considered use in violation of this policy. Employees engaging in actions not listed as acceptable use may be sanctioned for noncompliance unless they have received prior approval from the University’s Information Security Office. This policy establishes guidelines for the appropriate use of Barry University’s technology resources. It seeks to govern usage in a manner that maintains ethical, security, and legal best practices. This policy applies to all University employees, students, contractors, affiliates, visitors and guests (hereinafter “users”) and the use of all University-owned and leased devices connected to
networks and technology.
Information created or accessed on University systems remain the property of the University. Users of University systems have no expectation of privacy in the information they create, store, send or receive using the University’s systems or equipment. Any attempts to hide or make information private shall be considered a violation of this policy. All users of the University’s systems are responsible for knowing and complying with this policy.
The University is obligated to take measures necessary to protect its operations, information, reputation, and brand. These measures include actions necessary to minimize the impact of data breaches, information theft, or misuse of its network resources.
Barry University accepts no responsibility or liability for any misuse and/or unacceptable use of Barry University’s Information Technology Resources
b. Acceptable Use
The use of the University’s technology resources shall:
- Adhere to applicable laws, regulations, University policies, contractual agreements, and/or licensing agreements.
- Respect the confidentiality and rights of all users.
- Be viewed as a privilege -- continued access is contingent upon compliance with this policy and other University policies.
- Be used in a manner consistent with the user’s role at the University.
- Adhere to the employee and/or student code of conduct and be consistent with the educational mission and goals of the University.
- Avoid actions that jeopardize the confidentiality, accessibility, and integrity of the
- Adhere to applicable software piracy and copyright laws
- Obtain prior authorization from the Division of Information Technology before establishing any electronic information-sharing arrangements. Electronic information sharing includes but is not limited to Cloud hosting, file-sharing services, social media accounts, websites, File Transfer Protocol (FTP) sites, Electronic Data Interchange (EDI), commercial activities, or any other file or information transfer services or methods.
c. Unacceptable Use
The use of the University’s technology resources shall not:
- Attempt to access, monitor or tamper with another user’s device without authorization from the user.
- Attempt to disable or circumvent any protections on University computing equipment.
- Install network devices or systems that can disrupt normal operations of the network. This includes but is not limited to wireless routers, switches, servers, port scanners, BOTs, etc.
- Attempt to provide unauthorized remote access to the Barry network using 3rd party applications. This includes but is not limited to, LogmeIn, Anydesk, VNC, ShowMyPC, etc.
- Interfere with the normal operation of computers, terminals, peripherals, or networks.
- Engage in illegal activities such as but not limited to hacking, creating malware/viruses or compromising other systems or networks.
- Publish or display unlawful or inappropriate content such as but not limited to obscene, abusive, harassing or derogatory material outside of instructional or official use.
- Use Information Technology resources for commercial purposes, except when explicitly approved by Human Resources. This includes but is not limited to email, printing, and software usage.
- Engage in cyberbullying activities such as but not limited to harassing, denigrating, impersonating, or cyberstalking others online.
Activities that comply with legal requirements or official University business (e.g., network load testing or remote software deployments) are considered acceptable use. Human Resources or Information Technology shall provide approval to conduct these activities.
III. Reporting Unacceptable Use
If there is reason to believe that unacceptable use of information technology has occurred, the incident shall be reported immediately to the Information Security Office at email@example.com. This includes the misuse of Barry University’s network resources, information systems or if there is reason to believe sensitive data has been lost, stolen, or compromised regardless of the media or method.
Failure to comply with the policy may:
- Subject faculty or staff to disciplinary action up to and including termination under the Progressive Discipline Policy and/or Faculty Handbook.
- Subject a student to disciplinary action as described in the University’s Student Handbook.
- May result in termination of relationship or agreement with the vendor.
V. Review Cycle
This policy will be reviewed every three years or as necessary. The review process will be managed by the Information Security Office.