Acceptable Use Policy Adopted April 2010 • Revised March 2024, 1.0 Overview The Information Technology Department is committed to protecting Greenfield Community College's students, employees, partners and the college from illegal or damaging actions by individuals, either knowingly or unknowingly. The GCC Information Technology Department wants to preserve our culture of openness, trust and integrity. GCCNET - Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, web browsing, and Secure File Transfer Protocol (SFTP), are the property of Greenfield Community College. These systems are to be used for business and academic purposes in serving the mission and principles of the college and of our students and employees in the course of normal operations. Effective security is a team effort involving the participation and support of every Greenfield Community College employee, student, and affiliate who deals with information and/or information systems. It is the responsibility of every user to know these guidelines and to conduct their activities accordingly. 2.0 Purpose The purpose of this policy is to outline the acceptable use of computer equipment and information technology systems at Greenfield Community College. These rules are in place to protect the employee, student and Greenfield Community College. Inappropriate use exposes Greenfield Community College to risks including malware attacks, compromise of network systems, non-public data, services, and legal issues. 3.0 Scope This policy applies to employees (full-time, part-time, and temporary), students, contractors, consultants, and other users at Greenfield Community College, including all personnel affiliated with third parties. This policy applies to all equipment that is owned or leased by Greenfield Community College. 4.0 Policy 4.1 General Use and Ownership Users should be aware that the data they create on the college systems remains the property of Greenfield Community College. Because of the need to protect the network, the Information Technology Department cannot guarantee the confidentiality of information stored on any network device belonging to Greenfield Community College. Employees are responsible for exercising good judgment regarding personal use. The Human Resources Department follows college guidelines concerning personal use of Internet/Intranet/Extranet systems that apply to all employees. If there is any uncertainty, employees should consult their supervisor or the Human Resources Department. The Information Technology Department recommends that any information considered sensitive or vulnerable be encrypted. For security and network maintenance purposes, authorized employees of Greenfield Community College may monitor equipment, systems and network traffic upon request by the President. Greenfield Community College reserves the right to audit networks and systems periodically to ensure compliance with this policy and security. 4.2 Security and Proprietary Information Information contained on Internet/Intranet/Extranet-related systems should be classified as confidential or not confidential as defined by Information Sensitivity Guidelines and FERPA. Authorized users are responsible for the security of their passwords and accounts. System level passwords should be changed quarterly; user level passwords every six months. All PCs, laptops, and workstations should be secured with a password-protected screensaver set to activate at 20 minutes or less, or by logging off when unattended. Special care should be exercised for portable computer security. Postings from a GCC email address to newsgroups should contain a disclaimer unless posting is part of official duties. All connected devices must run approved anti-malware software with a current virus database. Use caution when opening email attachments from unknown senders. 4.3 Limitations Full GCC computer resources are available only to currently enrolled students and employees. Guest access is available to the public in designated areas. Users are responsible for deleting files that are no longer needed. All use must comply with this policy and applicable laws. Accounts and passwords are not transferable. Profanity, harassing, obscene, or sexually explicit materials may not be transmitted through GCC systems. Attempts to disrupt or damage the GCC Computer Network are prohibited. Unauthorized attempts to acquire non-public information violate confidentiality laws. 4.4 Unacceptable Use The following activities are generally prohibited unless required for legitimate job responsibilities. Under no circumstances is an employee or student authorized to engage in illegal activity while using GCC-owned resources. System and Network Activities Violations of copyright or intellectual property laws. Unauthorized copying or distribution of copyrighted material. Illegal export of software or encryption technology. Introduction of malware. Sharing account passwords. Engaging in harassment or hostile workplace violations. Fraudulent offers using GCC accounts. Security breaches or network disruptions. Port scanning without prior notification to IT. Unauthorized network monitoring. Circumventing user authentication. Interfering with another user's session. Providing employee or student lists without authorization. Email and Communications Activities Refer to the Greenfield Community College e-communication policy. This policy is not intended to interfere with rights under the First Amendment or the National Labor Relations Act.