If you have any questions about this policy, please ask administration for assistance.
Effective Date: August 10, 2020
This Acceptable Use Policy Regarding Information Technology (the “Policy”) is intended to support the mission of Florida National University (the “University”) and the needs of its students, faculty, and staff, by facilitating the use of information technology. This Policy outlines the standards of acceptable use with respect to the IT Resources that are provided by the University, and governs access to and use of such resources. Inappropriate use of information technology can place the University and others at risk. The current version of this Policy can always be obtained from administration.
The University complies with all applicable federal, state, and local laws, and nothing contained herein is intended to be a violation of those laws. The terms of this Policy shall yield to applicable law where required. Without limitation, this Policy is not intended to prevent employees from engaging in legally protected activities, and is not intended to restrict communications or actions protected by applicable law. Nothing herein is designed or intended to curtail activities under Section 7 of the National Labor Relations Act, as amended.
The University requires that all Users act responsibly in using the IT Resources, and do so in compliance with all applicable laws, administrative rules and regulations, all University policies, and all contractual and license agreements. Users are responsible for the appropriate, ethical, and lawful use of the IT Resources, and for taking reasonable precautions to secure all IT Resources used by them. Users are responsible for reporting to the Administrator or a direct supervisor (in the case of employees) malfunctioning equipment or applications, inappropriate uses of the IT Resources, unauthorized activity, and any suspected or actual breaches of security, and are responsible for assisting in the resolution of such matters. Users are responsible for promptly reporting to the University in writing any suspicion or occurrence of any unauthorized activity (as outlined herein) as it may pertain to the IT Resources. The duties and obligations imposed by this Policy shall be in addition to and not a limitation of any duties or obligations otherwise imposed by applicable law or rule.
By using any of the University’s IT Resources, Users expressly agree to strictly abide by the terms and conditions contained within this Policy, in its current form and as amended from time to time. If you do not agree to this Policy, you must not use any of the IT Resources. The use of the IT Resources by an employee of the University shall signify that employee’s agreement to the terms and conditions of this Policy as a condition of such employment.
The following definitions shall apply in connection with this Policy:
With respect to students, visitors, and guests, the IT Resources are provided as a courtesy and convenience, on an as-is basis, and may be discontinued or modified by the University at any time without prior notice.
The University provides wireless internet access at its campuses solely as a courtesy and for the convenience of Users. Users connecting to such wireless internet access points acknowledge that such access may not be secure or private, and is subject to eavesdropping. Furthermore, such access may pose a threat to personally-owned devices that are connected to such wireless internet access points, and the data that is transmitted thereon. The University provides no warranty with respect to its provision of wireless internet access. Access to and use of the University’s wireless internet is at the User’s sole risk. To the fullest extent permitted by law, each user agrees to hold the university and its officers, directors, employees, agents, representatives, affiliates and service providers harmless from any claims in connection with his/her/their use of wireless internet provided by the university.
All IT Resources are the property of the University. All forms of Data produced by the University and its employees, including that produced on or with the IT Resources, that relate to University operations, are the property of the University, and are considered confidential and proprietary. Users are entitled to use the IT Resources only for purposes related to their employment or studies at the University. Notwithstanding the foregoing, Users may access the internet for personal use (web browsing, checking personal email), provided that (a) employees may not use the IT Resources for any such purposes during working hours, and (b) the IT Resources may not be used for commercial purposes unrelated to the operation of the University at any time. All IT Resources used while employed by the University must be returned to the University upon termination of employment, or earlier as may be determined by administration, along with any credentials necessary for the University to continue using the respective IT Resource without interruption. Deleting and/or the inappropriate altering or sharing of Data, whether during or after employment by the University, is strictly prohibited. Data produced by students shall be the property of the respective student, unless another University policy states that such data shall be the property of the University.
Users shall not have any expectation of privacy in connection with their use of the IT Resources. The University expressly reserves the right to audit and monitor all Data, Electronic Communications, and the use of all IT Resources. All employee Electronic Communications and Data transmitted through the IT Resources that relate to University operations are the property of the University. No employee Electronic Communications or Data transmitted through the IT Resources, even if personal in nature, are private or confidential to the employee transmitting or receiving such communications, and may be disclosed and produced to third-parties in connection with any information disclosure that encompasses or includes (inadvertently or otherwise) such transmissions. The University has the right to monitor and review all Electronic Communications transmitted through the IT Resources at all times. Users are responsible for the content of their Electronic Communications. All employee Electronic Communications transmitted through the IT Resources that relate to University operations are considered the University’s business records, and may be discoverable in the event of litigation. Notwithstanding anything contained in this Paragraph, the University reserves all of its respective rights with respect to its confidential, private, non-public, and/or proprietary information. The University reserves the right to monitor, log, and review a record of all websites and internet addresses visited through the IT Resources by any User, along with all content pertaining thereto.
Login credentials must meet certain minimum guidelines. Serious damage can be done to the University and the IT Resources if someone obtains a User’s login credentials. The following shall apply to all login credentials and access controls:
The IT Resources may only be used for lawful and appropriate purposes, and in accordance with this Policy. The below activities are strictly prohibited in connection with the IT Resources, and the University additionally may deem any other activity prohibited from time to time, as determined in the University’s sole discretion.
Employees are responsible for safeguarding and saving their work and the Data that they produce, and must save all Data to the appropriate network drive and location. Employees may not retain any copies of Data on their local drive, on removable storage, or on online platforms not provided by the Administrator for such use. Unless expressly authorized to do so by the Administrator, saving, copying, moving, or backing up University Data on any other storage medium (including, but not limited to, a desktop computer, laptop computer, a removable storage device, or online storage) is strictly prohibited. Students are responsible for safeguarding and saving their work and the Data that they produce. The University does not provide any backup or archival services for student Data.
The University may store any or all of its Data (and any backups thereof) internally, or on file storage that is located at remote hosting, service, and storage facilities maintained and controlled by third-party providers.
Employees and students are provided with email accounts by the University. These email accounts are provided through a third-party provider, and all information pertaining to these accounts (including the electronic mail messages themselves, and any attachments thereto) may be located at remote locations maintained and controlled by a third-party provider. By using an electronic mail account provided by the University, Users agree to the terms of use and privacy policies of the University’s third-party providers. Users should avoid opening unsolicited messages and report any suspicious messages to the Administrator. Users should delete all spam immediately, and not reply to any such messages in any way, even if the message states that you can request to be removed from its distribution list. If you continue to receive such messages, contact the Administrator who can block any incoming messages from that address or domain. Employee electronic mail is subject to Article 8 (No Expectation of Privacy) of this Policy.
Users shall respect all copyrighted works and shall not copy, disseminate, or transmit any copyrighted materials without the prior express written permission of the copyright holder. Removing or altering any copyright or other intellectual property notices shall be strictly prohibited. For additional information, please refer to the University’s Policy on Unauthorized Distribution of Copyrighted Materials and the Copyright Infringement Compliance Plan in the University Catalog.
The University shall have the sole and exclusive right to determine whether a User is in compliance with this Policy. In connection therewith, the University shall have the right to:
The University shall have the right to fully cooperate with law enforcement authorities and court orders in connection with any investigation of User conduct in connection with the IT Resources. Such cooperation may include, but shall not be limited to, disclosing a User’s identity, provided that such disclosure is made in compliance with all applicable laws. For the avoidance of doubt, any Data of a student User that meets the definition of an Education Record under the Family Educational Rights and Privacy Act (“FERPA”) will only be disclosed without the student’s consent if the disclosure is permitted by FERPA, which includes the disclosure of education records to comply with a judicial order or lawfully issued subpoena. FERPA protections do not extend to the records of FNU’s law enforcement unit. For additional information, please refer to the University’s policy on FERPA in the University Catalog. To the fullest extent permitted by law, each user agrees to hold the university and its officers, directors, employees, agents, representatives, affiliates and service providers harmless from any claims in connection with action taken by the university in connection with any such investigation or cooperation, provided that such action is in compliance with all applicable laws.
No portion of this Policy may be waived by any University employee. The failure of the University to enforce any of the terms of this Policy, or to exercise any right herein, shall not operate to or be construed as a waiver or relinquishment of any of the requirements, or any of the University’s rights hereunder, with respect to further conduct. A violation of any portion of this Policy shall be grounds for disciplinary action up to and including termination of employment (with respect to employees) or expulsion from the University (with respect to students), in the University’s sole and absolute discretion, subject to all applicable laws, rules, and regulations.
This Policy may be amended at any time by the University, and in a manner determined by the University. Once revised, the revised Policy shall immediately become the official Policy of the University with respect to the IT Resources. The University will notify Users when this Policy is amended, and Users are responsible for staying up to date on the most current version, which can always be obtained from the Administrator.