NIC Policy 3.08.01 Acceptable Use Guidelines

Policy 3.08.01 Acceptable Use

Procedure 3.08.01 Acceptable Use

Guidelines for Policy and Procedure 3.08.01 Acceptable Use:

User Responsibilities. Users of NIC technology resources must:

  1. Follow all applicable federal and state laws;
  2. Follow all NIC policies and procedures and IT standards;
  3. Actively maintain the security of all devices accessing NIC technology resources or being used to access, store, or process NIC-maintained data.
  4. Actively maintain the security and privacy of NIC data or NIC-maintained third party data and store such data only in authorized locations, consistent with NIC policies and standards.
  5. Report privacy, security, or technology policy violations to the NIC Helpdesk .  helpdesk@nic.edu or call (208) 769-3280

User Actions Constituting Misuse of NIC Technology Resources.
User actions, such as those described below, of NIC technology resources shall be considered misuse of NIC technology resources and will be in violation of policy 3.08.01: Acceptable Use.

  1. Utilizing any identity or account not specifically assigned by NIC to the user without approval;
  2. Hindering monitoring, or intercepting another user’s network traffic, except as expressly authorized by NIC;
  3. Attempting to access, disclose, destroy, use, or modify NIC systems or data without authorization;
  4. Using technology resources for partisan political or campaign activities, such as participating or intervening in a campaign for public office or making technology resources available to a candidate, campaign, political party, or political actions committee. See also: policy 3.02.11 Political Activities
  5. Using technology resources for commercial purposes (including but not limited to personal financial gain).  See also: policy 3.02.15 Conflict of Interest
  6. Using NIC resources for personal, non-commercial purposes, excluding uses such as personal email or access to the internet, when such activities do not interfere with an individual’s employment responsibilities at NIC or give rise to a cost to NIC.
  7. Using technology resources for unlawful communications or activity, including threats of violence, obscenity, child pornography, defamation, harassing communications (as defined by law), such as cyberstalking or other similar activities in violation of stalking laws;
  8. Intentional access to or dissemination of pornography by NIC employees, temporary staff, contractors, or vendors, unless such use is specific to work-related functions and has been approved by the respective manager or such use is specifically related to an academic discipline or grant/research project.  This applies to electronic communication distributed or sent within the NIC network or to other networks while using the NIC network.
  9. Using technology resources for the creation or transmission of materials which may put any person’s personal safety at risk;
  10. Using technology resources for unauthorized access to any system or network;
  11. Engaging in the unauthorized copying, distributing, or transmitting of copyrighted materials such as software, music, or other media.

Noncompliance. Noncompliance with this policy may result, depending upon the nature of the non-compliance, in the user’s account or access to NIC technology resources being temporarily suspended, or disabled, or permanently terminated. In the case of temporary suspension, NIC may require implementation of certain remedial measures or satisfaction of certain educational courses prior to reinstatement of the user’s account or access. Additionally, the user may be referred for institutional sanctions following the appropriate NIC policy and procedure and may be subject to civil and criminal penalties (See procedure 3.08.01 Acceptable Use).

 

Details

Article ID: 35894
Created
Thu 8/24/17 12:35 PM
Modified
Thu 1/11/18 1:45 PM