Proximity Learning, Inc.
Acceptable Use of Information Resources

Policy Status: Active
Subject Matter Expert: Diana Albiston, Director of Human Resources
Policy Steward: Evan Erdberg, President / CEO

PURPOSE:
To establish and define the “acceptable use” of Proximity Learning, Inc.’s (“PLI”) electronic resources, including, but not limited to, computer facilities and services, computers, networks, electronic mail services, and electronic information and data, and video and voice services, to support the educational, research and service missions of PLI.

SCOPE:
This policy is applicable to all faculty, staff, students, and other individuals using PLI’s network resources, and individuals who are conducting business using external networks.

This includes all PLI owned, licensed, or managed hardware and software, the use of PLI network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network, and use of information.

Policy:

Individuals with access to PLI’s information technology resources are responsible for
their appropriate use, and by their use, agree to comply with all applicable policies,
guidelines and standards, and applicable State and Federal laws and regulations.

For use and access to be acceptable, individuals must demonstrate respect for:

  • the rights of others’ privacy;
  • intellectual property rights (e.g. as reflected in licenses and copyrights);
  • ownership of information;
  • system mechanisms designed to limit access; and
  • an individual’s right to be free of intimidation, harassment, and/or retaliation.

All individuals’ granted access to PLI information technology resources must agree to
and accept the following:

a. Using only the information technology resources for which they are authorized by
PLI.

b. Utilizing appropriate authentication mechanisms to access information
technology resources.

c. Not attempting to access information technology resources for which their
authorization may be erroneous or inadvertent.

d. Only using accounts, passwords, and/or authentication credentials that have
been authorized to use consistent with their role at PLI.

e. Protecting, and not sharing, their account, password, and/or authentication
credentials.

f. Only sharing data with others as defined by applicable policies and procedures,
and dependent on their assigned role.

g. Not using PLI information technology resources to represent the interests of any
non-PLI group or organization unless authorized by an appropriate PLI
department or office or that could be taken to represent PLI.

h. Not using any hardware or software designed to assess or weaken security
strength, unless authorized by the President / CEO of PLI.

i. Not engaging in disruptive “spamming” (i.e., sending unsolicited electronic
communication to groups of recipients at the same time), or acting in a way that
will harm, damage, corrupt, or impede authorized access to information
resources, systems, networks, equipment, and/or data.

j. Not forging identities or sending anonymous messages, unless the recipient has
agreed to receive anonymous messages.

k. Not using PLI information technology resources to alter, disrupt, or damage
information technology resources of another person or entity.

l. Not using PLI information technology resources to upload, download or distribute
copyrighted or illegal material which results in violation of law.

m. Complying with all licenses and contracts related to information technology
systems which are owned, leased, or subscribed to by PLI, and complying with
applicable local, state or federal laws, and institutional policies, rules, and
guidelines as they relate to information technology resources.

In order to protect the security and integrity of Information Resources against unauthorized or improper use, and to protect authorized individuals from the effects of any potential abuse or negligence, PLI reserves the rights, at its sole discretion, to limit, restrict, or terminate any account or use of Information Resources, and to inspect, copy, remove or otherwise alter any data, file, or system resources that may undermine authorized use. PLI also reserves the right to inspect or check the configuration of Information Resources for compliance with this policy, and to take such other actions as in its sole discretion it deems necessary to protect PLI Information Resources. PLI also reserves the right to control and/or manage use of the frequency spectrum within the boundaries of all locations. Individuals of PLI are required to report transmitting devices and their characteristics to PLI officials, if so requested. PLI reserves the right to require those units or individuals found to have such devices that interfere or are suspected to interfere with operation of centrally managed PLI systems, to discontinue use of such devices, and, if necessary, to remove them.

PLI shall not be liable for, and the individual assumes the risk of, inadvertent loss of data or interference with files resulting from PLI’s efforts to maintain the privacy, integrity and security of PLI’s Information Resources.

PLI is not responsible for the content of individuals’ personal web spaces, nor the content of servers, programs or files that individuals maintain either in their personally allocated file areas on PLI-owned computer resources or on personally-owned computers connected to PLI’s Information Resources.

PLI reserves the right to suspend network access or computer account(s), or to impose sanctions as defined in this policy if individually-maintained files, programs or services are believed to have been operating in violation of either law or policy. Additionally, PLI retains the right subject to applicable law and policy to search and/or seize, for investigative purposes, any personal hardware or systems connected to PLI Information Resources if there is cause to suspect that such hardware or systems were used either in violation of federal, state or local law, or in violation of the terms and conditions set forth in PLI policies governing computer and network usage. Restoration will be at the sole discretion of PLI. PLI shall, to the full extent required under law, cooperate with all legal requests for information, including, but not limited to, disclosure of system user account information when made by any law enforcement officer or legal representatives pursuant to court order, subpoena or other legal process.

PLI can enforce the provisions of this policy and the rights reserved to PLI without prior notice to the user.

EXCEPTIONS AND EXEMPTIONS:
Exceptions to, or exemptions from, any provision of this policy or supplemental IT Guidelines and Standards must be approved by the President / CEO in accordance with the Requests for Exception to Information Security Policy Standard.

Any questions about the contents of this policy or supplemental IT Guidelines and Standards should be referred directly to the President / CEO (eerdberg@proxlearn.com) who has the responsibility to interpret the Security Standards.

POLICY VIOLATIONS:
Any PLI department or unit found to operate in violation of this policy may be held accountable for remediation costs associated with a resulting information security incident or other regulatory non-compliance penalties, including but not limited to, financial penalties, legal fees, and other costs.

Faculty, staff, or students who violate this policy and supplemental IT Guidelines and Standards may be subject to appropriate disciplinary action, specifically including suspension or termination of access and/or network privileges.

FURTHER INFORMATION:
For questions, additional details, or to request change to this Policy, please contact the  President / CEO (eerdberg@proxlearn.com)