Regimental Manual - APPENDIX K

APPENDIX K
Reviewed 22 February 2018

MASSACHUSETTS MARITIME ACADEMY
IT SERVICES ACCEPTABLE USE POLICY

Responsible Use of Information Technology:
Information technology resources provided by MMA are made available to students, faculty, staff and approved guests primarily as tools for enhancing and facilitating teaching, learning and administrative functions.  MMA encourages the use of college resources for these primary activities.  These resources include, but are not limited to, hardware (including telephones, computers, traditional media equipment and multimedia facilities and equipment) either owned or leased by the College, software, and consulting time (and expertise) of the staff of the Information Technology Services (ITS) Department.

Massachusetts Maritime Academy reserves the right to keep primary activities operational.  As a consequence, the use of technology resources provided by the Academy for endeavors not directly related to enhancing and facilitating teaching, learning and administrative functions should be considered as secondary activities.  Should such secondary activities in any way interfere with primary activities, they may be terminated immediately and the offending parties may forfeit their right to access college information technology resources.

Many of the information technology resources of the Academy are shared among the entire Academy community.  Everyone using those resources should be considerate of the needs of others and be certain that nothing is done to impede anyone else’s ability to use these resources.  Such impediments may include, but are not limited to:​

  • Activities that obstruct usage or deny access to others, including extraordinary bandwidth usage
  • Activities that relate to sexual, racial and other forms of harassment
  • Activities that are libelous
  • Activities that violate copyright laws
  • Activities that violate local, state or federal laws
  • Activities that violate UMASS ITS (service provider) acceptable use policies
  • Activities that violate cadet regulations
  • Unauthorized use of computer accounts
  • Impersonating other individuals
  • Attempts to capture or crack passwords or break encryption protocols
  • Activities that compromise privacy
  • Attempting to "hack" into any computer either at this College or elsewhere
  • Destruction or alteration of data or information belonging to others
  • Attempting to create, for any purpose, worm or virus programs or programs that attempt to explore or exploit network, security or other vulnerabilities.
  • Allowing anyone else to use any of your account(s)
  • Extensive use of resources for private or personal use (such as personal webpages or sites)

The use of any information technology resources of the College implies acceptance of all current operational policies.

Monitoring of Computer Systems and Network Resources:

In compliance with federal law, the College cannot guarantee privacy nor should a user have any expectation of privacy in any message, voice communication, file, image or data created, sent, retrieved or received by use of the Academy’s equipment and/or access.  The Academy reserves the right to monitor any and all aspects of its computer systems and to do so at any time, without notice, and without the user’s permission.

The Academy holds as core values the principles of academic freedom and free expression.  In consideration of these principles, the Academy will not monitor the content of electronic communications of its employees in most instances, nor will it examine the content of employee electronic communications or other employee electronic files stored on its systems except under certain circumstances.  In this context, “electronic communications” include, but are not limited to, telephone communications, so-called “voice mail,” e-mail, online chat and other computer files traversing the Academy network or stored on Academy equipment.
Examples of when monitoring and/or review may occur include, but are not limited to, the following circumstances:

  • Communications or files targeted by orders of the court of law.
  • Electronic communications or files that have been inadvertently exposed to technical staff who are operating in good faith to resolve technical problems.  When technical staff inadvertently sees or potentially illegal content in communications or files, they are required to report what they have seen or heard to appropriate authorities.  Otherwise, the Academy expects technical staff to treat inadvertently encountered electronic communications and files of Academy employees as confidential and not subject to disclosure to anyone.
  • Routine administrative functions, such as security test or computing systems, including password testing by system administrators and investigations of attempted access into systems by unauthorized persons.
  • Routine office functions.
  • An investigation into allegations of violations of law or policy.
  • A reasonable or urgent need for access to Academy business documents when an employee is unavailable.