The Acceptable Use Policy is a collection of policies approved by the Cascadia College Board of Trustees.  It defines how students, staff, and faculty are able to legally, ethically, and fairly use Cascadia's technology resources.

The policy defines the legal rights of Cascadia in reference to Cascadia College computer systems, it defines the rights of users and their data, it states that only legal, licensed copies of software are permitted to be installed on campus computers.  It holds all users responsible for using the computers in an ethical manner as defined by state law.

Cascadia College maintains the right to monitor all its systems to ensure that no single user places college's systems at risk nor unfairly monopolizes network resources such that resource availability declines for others.

Information Services Acceptable Use Policy

Purpose

The purpose of this policy is to outline the acceptable uses of computing and information technology resources for Cascadia College community. This policy outlines the standards for acceptable use of College computing and information technology resources that include, but are not limited to, equipment, software, networks, data and telecommunications equipment whether owned, leased or otherwise provided by Cascadia.

Top
Acknowledgement and Acceptance

By logging into a Cascadia computer, or network system via remote services or personal device(s), you are acknowledge and accept the terms of use as set forth in the Acceptable Use Policy. We recommend that you read through the entire Acceptable Use Policy before utilizing any of Cascadia's network resources.

If you have a question or concern that you don't feel is covered in the Acceptable Use Policy, please email it to the HelpDesk at helpdesk@cascadia.edu.

Top
Acceptable Uses

Preserving the access to information resources is a community effort that requires each member to act responsibly and guard against abuses. Therefore, both the Cascadia community as a whole and each individual user have an obligation to abide by the following standards of acceptable and ethical use:

  • Use only those computing and information technology resources and data for which you have authorization and only in the manner and to the extent authorized.

  • Use computing and information technology resources only for their intended purpose.

  • Protect the confidentiality, availability, and integrity of computing and information technology resources, including data.

  • Abide by applicable laws and College policies and all applicable contracts and licenses and respect the copyright and intellectual property rights of others, including the legal use of copyrighted material.

  • Respect the finite capacity of resources and limit use so as not to consume an unreasonable amount of resources or to interfere unreasonably with the activity of others.

  • Respect the privacy and personal rights of others.
Top
Unacceptable Uses
The following unacceptable uses apply to all uses of College technology resources. In the constantly changing world of information technology, it is impossible to enumerate all non-acceptable uses of College computers, information systems, and networks. All users are expected to conduct themselves within acceptable use boundaries and may not infringe on the following examples of unacceptable use.
  • Use IS resources without proper authorization.

  • Attempt to monitor, intercept, analyze or modify network traffic or transactions not specifically addressed to your computer.

  • Harass, defame, intimidate or threaten anyone through the use of computing or network resources.

  • Use computing or network resources for profit, commercial or political use.

  • Attempt to alter or reconfigure any College IS resources, e.g. network infrastructure, servers.

  • Attempt to obtain privileges for which you are not authorized.

  • Attempt to learn another user's password(s) or personal information.

  • Attempt to alter or obscure your identity or your computer's identity, including but not limited to IP Address and email address, while communicating on any network.

  • Interfere with or disrupt computer or network accounts, services or equipment of others including but not limited to consumption of excessive IS resources, (e.g. local area network or Internet bandwidth) through the propagation of worms or viruses or the inappropriate sending of broadcast messages to large number of hosts.

  • Interfere with or circumvent the IS Group's responsibilities and procedures.

  • Consume excessive IS resources, e.g. Local Area Network or Internet Bandwidth.

  • Abuse email privileges.

  • Download and/or share copyrighted material for which you do not have the proper authorization.
Top
Applicability

This policy applies to all users of Cascadia computing and information technology resources including faculty, staff, students, alumni, guests, external individuals or organizations and individuals accessing external network services, such as the Internet via College facilities.

The Director for Information Services will determine operational policies, networking standards and procedures to implement the principles outlined in this policy. IS has the right to protect shared information services.

Top
Coordination with Other Policies and Law

Users of information service resources at Cascadia are subject to applicable federal, state, and local laws, applicable contracts and licenses, and other university policies, including those for Human Resources, and those contained in the faculty and student handbooks, and notably those policies governing copyright and intellectual property compliance. Users are responsible for ascertaining, understanding, and compliance with the laws, rules, policies, contracts and licenses applicable to their particular uses.

Top
Sanctions for Violations

Failure to comply with the appropriate use of computing and information technology resources threatens the atmosphere for the sharing of information, the free exchange of ideas and the secure environment for creating and maintaining information property and subjects one to disciplinary action.

Any member of the Cascadia community found using computing and information technology resources in violation of this policy may be denied access to College computing resources and may be subject to disciplinary action, both outside and within the College, including, without limitation, suspension of system privileges, expulsion from school, termination of employment and/or legal action as may be appropriate.

Information Services will publish a procedure describing how student violations are administered.

Top
Privacy and Security

There is no inherent expectation of privacy for information stored on Cascadia information services resources, except as provided by federal and state law and other College policy. Every effort will be made to maintain individual privacy, but the College will not be liable for the failure of these privacy efforts.

While the College does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the College's computing resources require the backup and caching of data and communications, the logging of activity, the monitoring of general usage patterns, the scanning of systems and network ports for anomalies and vulnerabilities, and other such activities that are necessary for the rendition of service.

Top