Information Technology Acceptable Use Policy
Policy approved by Mercy College Board of Trustees, September 2023
The purpose of this policy is to outline the use of Mercy College of Ohio’s (“the College”) computer resources accessed by students for educational and research purposes. The intention is to keep restrictions on individual use to a minimum. It is essential that users observe reasonable standards of behavior regarding the use of the computing facilities and services. The College reserves the right to access all information on the College’s computers, equipment, and network without prior notice.
- Students who are, as part of their study and/or work (paid, volunteer or contract), required to or involved with use of the College’s computers (“users”) must agree to abide by the standards of this policy to use these resources, which prohibits the following:
- Any attempt to modify or damage computer equipment;
- Tampering of computer and/or network resources or engaging in any activity to interfere with normal operations of computers, network, and facilities;
- Improper use of computer equipment including, but not limited to:
- Connecting personal or unapproved equipment to any college-owned computer or to the network;
- Installing personal software, including non-academic games, on college-owned computer;
- Installing college software on equipment that is personally owned;
- Recreational game playing;
- Knowingly using any system to produce system failure or degrade performance (e.g., creating or propagating viruses, overloading network with excessive data, instituting or promulgating chain letters, or instigating unauthorized mass posting of any types).
- Using an ID belonging to another individual or sharing user IDs and passwords with other users or any other person;
- Making unauthorized copies of licensed software and illegally using copyrighted software and materials;
- Using computer resources for private purposes including for-profit endeavors or illegal purposes and, in a manner, inconsistent with the College’s license agreements;
- Unauthorized reading, use of, or deletion of private files or email belonging to another user. This includes accessing or intentionally destroying college software;
- Engaging in the unauthorized duplication, alteration or destruction of data, programs, or software;
- Communicating any credit card number or other financial account number, or any social security number with/without the permission of the owner;
- Circumventing or subverting any system or network security measures;
- Posting of obscene materials; this activity is unlawful, and users are specifically cautioned against linking to sites that contain such materials, even if the site has other useful content;
- Engaging in activity that is illegal under any local, state, federal, or international law;
- Use of College email should adhere to the same standards of conduct as any other form of mail. The use of distasteful, inflammatory, harassing, or otherwise unacceptable comments is prohibited. The College may engage in monitoring of email messages or other electronic files created by students, faculty, and staff. Users are asked to delete unnecessary emails on a regular basis.
- Students that are as part of their study and/or work, (paid, volunteer or contract), required to or involved with use of the College’s computers will attest to their understanding of this policy at orientation.
- Each user is responsible for any misuse of the Information System perpetrated using the user's account or network access. Therefore, the user must take steps to ensure that others do not gain unauthorized access to Information Systems through the user's account. Users are responsible for constructing and using strong passwords. It is never appropriate to print, store online, or give personal passwords to others. Should tech support require the sharing of an individual’s password, it is the user’s responsibility to ensure the password is changed upon completion of support services. This requirement also includes the sharing of passwords with supervisors and managers.
- Users are responsible for taking reasonable precautions to ensure that they do not introduce viruses into the network.
- Users must scan files and downloads for viruses and other destructive programs before storing or installing them on a workstation or other computer system. This includes laptops and home machines that access the network remotely. Users are required to protect any personal computer that connects to the network with an anti-virus software package. The anti-virus software operated on College-supplied workstations is configured for automatic updates to the software and virus definitions on a weekly basis, e-mail scanning, automated disk scanning, and on access scanning where possible. Interruption or overriding any of these settings is strictly prohibited without prior authorization from Information System management or staff.
- Users should never open attachments or follow links provided in email messages from senders that are not recognized. Extreme caution should be used when opening attachments or following links that originate from outside the College, even from known senders. Links and attachments can be used to perform various malicious functions on workstations (e.g., install viruses, key loggers, remote access software, etc.).
- Any suspicious email should be reported immediately via the "Report Phishing" option (or current reporting protocol) in webmail. Users should immediately contact the Bon Secours Mercy Health Service Desk at 1-833-691-4357 if they accidentally click on a link that is suspected as being malicious or if the user provided login credentials to an unknown source.
- There is no expectation of privacy in the Mercy College e-mail system, computer equipment, network, or other informational technology resources. The following actions are specifically NOT allowed on the Mercy College e-mail system:
- Knowingly sending or forwarding any type of malicious code such as Viruses, Worms, Trojan Horses, Malware, etc.
- Sending numerous copies of the same or substantially similar messages or sending very large messages or files to a recipient with the intent to disrupt a server or account. The propagation of chain letters is similarly prohibited, whether the recipient wishes to receive such mailings. The College is not responsible for the forwarding of e-mail sent to any account that has been suspended or terminated. Such e-mail will be returned to sender, ignored, or deleted.